Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Offline untrusted storage with immediate detection of forking and replay attacks., , , and . STC, page 41-48. ACM, (2007)Virtual monotonic counters and count-limited objects using a TPM without a trusted OS., , , , and . STC, page 27-42. ACM, (2006)Bayanihan Computing .NET: Grid Computing with XML Web Services., , , , , , and . CCGRID, page 434-435. IEEE Computer Society, (2002)Bayanihan: Web-Based Volunteer Computing Using Java.. WWCA, volume 1368 of Lecture Notes in Computer Science, page 444-461. Springer, (1998)The Trusted Execution Module: Commodity General-Purpose Trusted Computing., , , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 133-148. Springer, (2008)Rational clocking digital systems design., , and . ICCD, page 271-278. IEEE Computer Society, (1995)Towards Bayanihan: building an extensible framework for volunteer computing using Java., , and . Concurr. Pract. Exp., 10 (11-13): 1015-1019 (1998)Volunteer computing.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2001)ndltd.org (oai:dspace.mit.edu:1721.1/16773).An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems.. IPPS/SPDP Workshops, volume 1586 of Lecture Notes in Computer Science, page 763-780. Springer, (1999)Sabotage-Tolerance Mechanisms for Volunteer Computing Systems.. CCGRID, page 337-346. IEEE Computer Society, (2001)