Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The "PI" (placement and interconnect) system.. DAC, page 475-481. ACM/IEEE, (1982)A "greedy" channel router., and . DAC, page 418-424. ACM/IEEE, (1982)A Generalization and Proof of the Aanderaa-Rosenberg Conjecture, and . STOC, page 6-11. ACM, (1975)Scratch & vote: self-contained paper-based cryptographic voting., and . WPES, page 29-40. ACM, (2006)Being Taught can be Faster than Asking Questions., and . COLT, page 144-151. ACM, (1995)FlipIt: The Game of "Stealthy Takeover"., , , and . IACR Cryptology ePrint Archive, (2012)Diversity-Based Inference of Finite Automata., and . J. ACM, 41 (3): 555-589 (1994)Information, Data, Security in a Networked Future., , , , and . ACM-TURING, page 14:1. ACM, (2012)Privacy Tradeoffs: Myth or Reality? Panel., , , , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 147-151. Springer, (2002)How to Leak a Secret: Theory and Applications of Ring Signatures., , and . Essays in Memory of Shimon Even, volume 3895 of Lecture Notes in Computer Science, page 164-186. Springer, (2006)