From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discovering access-control misconfigurations: new approaches and evaluation methodologies., , , и . CODASPY, стр. 95-104. ACM, (2012)Efficient and Safe Network Updates with Suffix Causal Consistency., , и . EuroSys, стр. 23:1-23:15. ACM, (2019)Byzantine Quorum Systems., и . STOC, стр. 569-578. ACM, (1997)Intent-driven composition of resource-management SDN applications., , , и . CoNEXT, стр. 86-97. ACM, (2018)Write Markers for Probabilistic Quorum Systems., и . OPODIS, том 5401 из Lecture Notes in Computer Science, стр. 5-21. Springer, (2008)Censorship Resistance Revisited., , и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 62-76. Springer, (2005)Detecting and resolving policy misconfigurations in access-control systems., , и . SACMAT, стр. 185-194. ACM, (2008)A Linear Logic of Authorization and Knowledge., , , , и . ESORICS, том 4189 из Lecture Notes in Computer Science, стр. 297-312. Springer, (2006)Two-Party Generation of DSA Signatures., и . CRYPTO, том 2139 из Lecture Notes in Computer Science, стр. 137-154. Springer, (2001)Trustworthy Services and the Biological Analogy.. ESORICS, том 4734 из Lecture Notes in Computer Science, стр. 1. Springer, (2007)