Author of the publication

Trust in global computing systems as a limit property emerging from short range random interactions.

, , , and . ARES, page 741-748. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Trade-Offs in Partial Snapshot Implementations., , , and . SSS, volume 14310 of Lecture Notes in Computer Science, page 90-105. Springer, (2023)Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)., , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 324-327. Springer, (2019)On the Undecidability of the Panopticon Detection Problem., , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 78-87. Springer, (2022)Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks., , and . CSCML, volume 10879 of Lecture Notes in Computer Science, page 101-104. Springer, (2018)Cloud services cost comparison: a clustering analysis framework., , , , , and . Computing, 105 (10): 2061-2088 (October 2023)Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks., , , and . WCAN@ICALP, volume 171 of Electronic Notes in Theoretical Computer Science, page 17-31. Elsevier, (2006)A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution., , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-79. Springer, (2011)Trust in global computing systems as a limit property emerging from short range random interactions., , , and . ARES, page 741-748. IEEE Computer Society, (2007)How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem., , , and . Cryptogr., 6 (3): 42 (2022)A trustworthy architecture for managing cultural content.. Math. Comput. Model., 57 (11-12): 2625-2634 (2013)