Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 12 (12): 2441-2454 (2013)On the Efficiency of Durable State Machine Replication., , , , and . USENIX Annual Technical Conference, page 169-180. USENIX Association, (2013)The Architecture of a Secure Group Communication System Based on Intrusion Tolerance., , and . ICDCS Workshops, page 17-24. IEEE Computer Society, (2001)BFT-TO: Intrusion Tolerance with Less Replicas., , and . Comput. J., 56 (6): 693-715 (2013)Reverse Engineering of Protocols from Network Traces., , and . WCRE, page 169-178. IEEE Computer Society, (2011)Recycling Test Cases to Detect Security Vulnerabilities., and . ISSRE, page 231-240. IEEE Computer Society, (2012)On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study., , , , , and . EDCC, page 121-128. IEEE Computer Society, (2017)Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report., , and . DSN, page 630-637. IEEE Computer Society, (2016)Intrusion Tolerance in Wireless Environments: An Experimental Evaluation., , , , and . PRDC, page 357-364. IEEE Computer Society, (2007)Intercept: Profiling Windows Network Device Drivers., and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 61-75. Springer, (2013)