Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface.. Theory Comput. Syst., 42 (1): 1 (2008)A step-wise refinement approach for enhancing e-voting acceptance., , , , , and . ICEGOV, volume 351 of ACM International Conference Proceeding Series, page 275-280. ACM, (2008)Smart dust protocols for local detection and propagation., , and . POMC, page 9-16. ACM, (2002)The Impact of Network Structure on the Stability of Greedy Protocols., , , and . Theory Comput. Syst., 38 (4): 425-460 (2005)Attack Propagation in Networks., , , and . Theory Comput. Syst., 36 (5): 553-574 (2003)On the Random Generation and Counting of Matchings in Dense Graphs., , and . Theor. Comput. Sci., 201 (1-2): 281-290 (1998)Attack Modelling in Open Network Environments., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 268-277. Chapman & Hall, (1996)Advances in Rate-Based Flow Control., , and . SIROCCO, page 266-281. Carleton Scientific, (1997)Approximate Equilibria and Ball Fusion., , and . SIROCCO, volume 13 of Proceedings in Informatics, page 223-235. Carleton Scientific, (2002)The Cost of Concurrent, Low-Contention Read-Modify-Write., , and . SIROCCO, volume 17 of Proceedings in Informatics, page 57-72. Carleton Scientific, (2003)