Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algebraic Approach to IP Traceback., , and . NDSS, The Internet Society, (2001)Self-Healing Key Distribution with Revocation., , , , , and . S&P, page 241-257. IEEE Computer Society, (2002)A State-Transition Model of Trust Management and Access Control., , and . CSFW, page 27-43. IEEE Computer Society, (2001)Web Spoofing: An Internet Con Game, , , and . Proceedings of the 20th National Information Systems Security, Baltimore, Maryland, (October 1997)A Distributed High Assurance Reference Monitor., , and . ISC, volume 3225 of Lecture Notes in Computer Science, page 231-244. Springer, (2004)Fixing Races for Fun and Profit: How to Use access(2)., and . USENIX Security Symposium, page 195-206. USENIX, (2004)A Security Infrastructure for Distributed Java Applications., , and . S&P, page 15-26. IEEE Computer Society, (2000)Java Security: From HotJava to Netscape and Beyond., , and . S&P, page 190-200. IEEE Computer Society, (1996)The Security of Static Typing with Dynamic Linking.. ACM Conference on Computer and Communications Security, page 18-27. ACM, (1997)Cryptology As a Network Service., , , , and . NDSS, The Internet Society, (2001)