Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimal Indices for Successor Search., , , and . CoRR, (2013)Online conflict-free coloring for intervals., , , , , , , , and . SODA, page 545-554. SIAM, (2005)Why study the price of anarchy?: technical perspective.. Commun. ACM, 55 (7): 115 (2012)Approaching utopia: strong truthfulness and externality-resistant mechanisms., , , and . ITCS, page 221-230. ACM, (2013)Storing and Searching a Multikey Table (Extended Abstract), , , , and . STOC, page 344-353. ACM, (1988)Making Commitments in the Face of Uncertainty: How to Pick a Winner Almost Every Time (Extended Abstract)., , , and . STOC, page 519-530. ACM, (1996)Provable Unlinkability Against Traffic Analysis with Low Message Overhead., , , , , , and . J. Cryptol., 28 (3): 623-640 (2015)A case for associative peer to peer overlays., , and . Comput. Commun. Rev., 33 (1): 95-100 (2003)Provable Unlinkability against Traffic Analysis., , and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 266-280. Springer, (2004)Correlation Clustering - Minimizing Disagreements on Arbitrary Weighted Graphs., and . ESA, volume 2832 of Lecture Notes in Computer Science, page 208-220. Springer, (2003)