Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness of Class-Based Path-Vector Systems., and . ICNP, page 84-93. IEEE Computer Society, (2004)Breaking and fixing public-key Kerberos., , , , and . Inf. Comput., 206 (2-4): 402-424 (2008)The Impact of Communication Models on Routing-Algorithm Convergence., , and . ICDCS, page 58-67. IEEE Computer Society, (2009)On the Structure of Weakly Acyclic Games., , and . SAGT, volume 6386 of Lecture Notes in Computer Science, page 126-137. Springer, (2010)Self-stabilizing Uncoupled Dynamics., , , and . SAGT, volume 8768 of Lecture Notes in Computer Science, page 74-85. Springer, (2014)Specifying Kerberos 5 cross-realm authentication., , , and . WITS, page 12-26. ACM, (2005)Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection., , , , and . NDSS, The Internet Society, (2017)Accountability and deterrence in online life., , , , and . WebSci, page 7:1-7:7. ACM, (2011)Approximate Privacy: Foundations and Quantification., , and . ACM Trans. Algorithms, 10 (3): 11:1-11:38 (2014)Computationally sound mechanized proofs for basic and public-key Kerberos., , , and . AsiaCCS, page 87-99. ACM, (2008)