From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Breaking and fixing public-key Kerberos., , , , и . Inf. Comput., 206 (2-4): 402-424 (2008)Robustness of Class-Based Path-Vector Systems., и . ICNP, стр. 84-93. IEEE Computer Society, (2004)The Impact of Communication Models on Routing-Algorithm Convergence., , и . ICDCS, стр. 58-67. IEEE Computer Society, (2009)Accountability and deterrence in online life., , , , и . WebSci, стр. 7:1-7:7. ACM, (2011)Specifying Kerberos 5 cross-realm authentication., , , и . WITS, стр. 12-26. ACM, (2005)Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection., , , , и . NDSS, The Internet Society, (2017)Self-stabilizing Uncoupled Dynamics., , , и . SAGT, том 8768 из Lecture Notes in Computer Science, стр. 74-85. Springer, (2014)On the Structure of Weakly Acyclic Games., , и . SAGT, том 6386 из Lecture Notes in Computer Science, стр. 126-137. Springer, (2010)Computationally sound mechanized proofs for basic and public-key Kerberos., , , и . AsiaCCS, стр. 87-99. ACM, (2008)Open vs. closed systems for accountability., , и . HotSoS, стр. 4. ACM, (2014)