From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle., , и . ACM Trans. Inf. Syst. Secur., 4 (3): 289-319 (2001)Secure group communication (נוספו שער ותקציר בעברית: תקשורת קבוצתית בטוחה.).. Hebrew University of Jerusalem, Israel, (2001)Secure Reliable Multicast Protocols in a WAN., , и . ICDCS, стр. 87-94. IEEE Computer Society, (1997)Benchmarking and Testing OSD for Correctness and Compliance., , , , , и . Haifa Verification Conference, том 3875 из Lecture Notes in Computer Science, стр. 158-176. Springer, (2005)Using AVL trees for fault-tolerant group key management., , и . Int. J. Inf. Sec., 1 (2): 84-99 (2002)Secure Reliable Multicast Protocols in a WAN., , и . Distributed Comput., 13 (1): 19-28 (2000)B-trees, Shadowing, and Clones.. LSF, USENIX Association, (2007)zFS - A Scalable Distributed File System Using Object Disks., и . IEEE Symposium on Mass Storage Systems, стр. 207-218. IEEE Computer Society, (2003)Efficient Update Diffusion in Byzantine Environments., , , и . SRDS, стр. 90-98. IEEE Computer Society, (2001)Towards an Object Stor., , , , , , , , , и . IEEE Symposium on Mass Storage Systems, стр. 165-. IEEE Computer Society, (2003)