Author of the publication

Our Brothers' Keepers: Secure Routing with High Performance.

, and . SSS, volume 5340 of Lecture Notes in Computer Science, page 218-232. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Boolean Functions Computed by Random Boolean Formulas OR How to Grow the Right Function, and . CoRR, (2003)The Rectilinear Crossing Number of K10 is 62., , and . Electron. J. Comb., (2001)Reversible Circuit Realizations of Boolean Functions.. IFIP TCS, volume 155 of IFIP, page 67-80. Kluwer/Springer, (2004)Trinity: distributed defense against transient spam-bots., and . PODC, page 378-379. ACM, (2007)Our brothers' keepers.. PODC, page 430. ACM, (2008)Efficient synchronous snapshots., and . PODC, page 70-79. ACM, (2004)Can AOP Support Extensibility in Client-Server Architectures?, , , , , , and . Proceedings, ECOOP Aspect-Oriented Programming Workshop, (2001)An impossibility gap between width-4 and width-5 permutation branching programs.. Inf. Process. Lett., 94 (4): 159-164 (2005)Our Brothers' Keepers: Secure Routing with High Performance., and . SSS, volume 5340 of Lecture Notes in Computer Science, page 218-232. Springer, (2008)Restricted Stack Implementations., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 137-151. Springer, (2005)