Author of the publication

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities.

, , , , and . CODASPY, page 3-13. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Design of Virtual Machine Sandboxes for Distributed Computing in Wide-area Overlays of Virtual Workstations., , , , , , , and . VTDC@SC, page 8. IEEE, (2006)OverSoc: Social Profile Based Overlays., , , and . WETICE, page 205-210. IEEE Computer Society, (2010)On the design of autonomic, decentralized VPNs., , , and . CollaborateCom, page 1-10. ICST / IEEE, (2010)On the design of scalable, self-configuring virtual networks., , , , and . SC, ACM, (2009)Simplifying resource sharing in voluntary grid computing with the grid appliance., and . IPDPS, page 1-8. IEEE, (2008)Experiences with self-organizing, decentralized grids using the grid appliance., and . HPDC, page 183-194. ACM, (2011)Towards a uniform self-configuring virtual private network for workstations and clusters in grid computing., , and . VTDC@ICAC, page 19-26. ACM, (2009)SOLARE: Self-Organizing Latency-Aware Resource Ensemble., , and . HPCC, page 229-236. IEEE, (2011)SocialDNS: A decentralized naming service for collaborative P2P VPNs., , , , and . CollaborateCom, page 1-10. ICST / IEEE, (2010)Towards Collaborative Research and Education in Computer Architecture with the Archer System., , and . MASCOTS, page 462-464. IEEE Computer Society, (2010)