Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disarming offense to facilitate defense., and . NSPW, page 69-75. ACM, (2000)S-ARP: a Secure Address Resolution Protocol., , and . ACSAC, page 66-74. IEEE Computer Society, (2003)Adding Availability to Log Services of Untrusted Machines., , and . ACSAC, page 199-206. IEEE Computer Society, (1999)Workload Characterization For Performance Engineering Of Parallel Applications., and . PDP, page 457-462. IEEE, (1994)Scheduling issues in high-performance computing., , , and . SIGMETRICS Perform. Evaluation Rev., 26 (4): 60-69 (1999)A quantitative study of Public Key Infrastructures., , and . Comput. Secur., 22 (1): 56-67 (2003)L'evoluzione della sicurezza informatica: la prospettiva del CERT-IT, , and . Crimine virtuale, minaccia reale. ICT Security: politiche e strumenti di prevenzione, volume 571.2.7 of FTI Forum per la tecnologia dell'informazione, FrancoAngeli, (2004)Performance Gains from Leaving Idle Processors in Multiprocessor Systems., , , , and . ICPP (3), page 203-210. CRC Press, (1995)Xaba: Exact, Approximate, and Asymptotic Solvers for Multi-class Closed Queueing Networks., , and . Computer Performance Evaluation / TOOLS, volume 1786 of Lecture Notes in Computer Science, page 71-85. Springer, (2000)Secure pebblenets., , , and . MobiHoc, page 156-163. ACM, (2001)