Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quasi-Efficient Revocation in Group Signatures., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 183-197. Springer, (2002)Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds., , and . RAID, volume 3224 of Lecture Notes in Computer Science, page 258-277. Springer, (2004)Efficient and Secure Source Authentication for Multicast., , , and . NDSS, The Internet Society, (2001)Dynamic Quarantine of Internet Worms., , , , and . DSN, page 73-82. IEEE Computer Society, (2004)SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware., , , and . IPDPS, page 170. IEEE Computer Society, (2001)HookScout: Proactive Binary-Centric Hook Detection., , , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 1-20. Springer, (2010)Privtrans: Automatically Partitioning Programs for Privilege Separation., and . USENIX Security Symposium, page 57-72. USENIX, (2004)Expander Graphs for Digital Stream Authentication and Robust Overlay Networks., , and . S&P, page 258-270. IEEE Computer Society, (2002)BinHunt: Automatically Finding Semantic Differences in Binary Programs., , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 238-255. Springer, (2008)Private Keyword-Based Push and Pull with Applications to Anonymous Communication., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 16-30. Springer, (2004)