Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness., , , , and . IACR Cryptology ePrint Archive, (2019)Fully dynamic approximate distance oracles for planar graphs via forbidden-set distance labels., , and . STOC, page 1199-1218. ACM, (2012)Using petal-decompositions to build a low stretch spanning tree., and . STOC, page 395-406. ACM, (2012)Forbidden-set distance labels for graphs of bounded doubling dimension., , , and . PODC, page 192-200. ACM, (2010)Byzantine disk paxos: optimal resilience with byzantine shared memory., , , and . PODC, page 226-235. ACM, (2004)Compact name-independent routing with minimum stretch., , , , and . SPAA, page 20-24. ACM, (2004)Practical Synchronous Byzantine Consensus., , , and . IACR Cryptology ePrint Archive, (2017)On Approximate Distance Labels and Routing Schemes with Affine Stretch., and . DISC, volume 6950 of Lecture Notes in Computer Science, page 404-415. Springer, (2011)Compact Routing for Graphs Excluding a Fixed Minor., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 442-456. Springer, (2005)Distributed SSH Key Management with Proactive RSA Threshold Signatures., , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 22-43. Springer, (2018)