Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Ethereum Fraud Detection., , , and . Blockchain, page 266-273. IEEE, (2019)Changing young women's perceptions of CS via outreach., and . ITiCSE, page 333. ACM, (2013)Stabilizing Certificate Dispersal., and . Self-Stabilizing Systems, volume 3764 of Lecture Notes in Computer Science, page 140-152. Springer, (2005)Load-Balanced and Sybil-Resilient File Search in P2P Networks., , and . OPODIS, volume 5401 of Lecture Notes in Computer Science, page 542-545. Springer, (2008)Optimal dispersal of special certificate graphs., , and . GLOBECOM, page 2213-2217. IEEE, (2004)Key bundles and parcels: Secure communication in many groups., , and . Comput. Networks, 50 (11): 1781-1798 (2006)B-APT: Bayesian Anti-Phishing Toolbar., , , , and . ICC, page 1745-1749. IEEE, (2008)Optimal Dispersal of Certificate Chains., , and . IEEE Trans. Parallel Distributed Syst., 18 (4): 474-484 (2007)An efficient LKH tree balancing algorithm for group key management., , , and . IEEE Communications Letters, 10 (3): 222-224 (2006)Inclusive persuasion for security software adoption., and . SOUPS, USENIX Association, (2017)