From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Secure and Pseudonymous Client-Relationships with Multiple Servers., , , , и . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information., , и . INFOCOM, стр. 928-936. IEEE Computer Society, (1996)Resolving Message Complexity of Byzantine Agreement and beyond., , и . FOCS, стр. 724-733. IEEE Computer Society, (1995)How to Make Personalized Web Browising Simple, Secure, and Anonymous., , , и . Financial Cryptography, том 1318 из Lecture Notes in Computer Science, стр. 17-32. Springer, (1997)Application Aware Management of Internet Data Center Software.. LISA, стр. 33-46. USENIX, (2002)Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies., и . USENIX Security Symposium, USENIX Association, (1998)Local Computations on Static and Dynamic Graphs (Preliminary Version)., , и . ISTCS, стр. 268-278. IEEE Computer Society, (1995)Curbing Junk E-Mail via Secure Classification., , , и . Financial Cryptography, том 1465 из Lecture Notes in Computer Science, стр. 198-213. Springer, (1998)The Complexity of Word Problems - This Time with Interleaving, и . Inf. Comput., 115 (2): 293-311 (декабря 1994)Local Fairness in General-Topology Networks with Convergence Routing., , и . INFOCOM, стр. 891-899. IEEE Computer Society, (1995)