Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery., , and . LISA, page 1-13. USENIX Association, (2009)WACCO and LOKO: Strong Consistency at Global Scale.. University of North Carolina, Chapel Hill, USA, (2015)base-search.net (ftcarolinadr:cdr.lib.unc.edu:4b29b727v).WACCO and LOKO: Strong Consistency at Global Scale., , , , and . CIC, page 130-141. IEEE Computer Society, (2015)Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture., , , , , and . ANCS, page 171-182. IEEE Computer Society, (2015)Server-side verification of client behavior in online games., , and . ACM Trans. Inf. Syst. Secur., 14 (4): 32:1-32:27 (2011)Data Structures with Unpredictable Timing., and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 456-471. Springer, (2009)Server-side Verification of Client Behavior in Online Games., , and . NDSS, The Internet Society, (2010)