Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Synchronous Byzantine Consensus., , , and . IACR Cryptology ePrint Archive, (2017)Compact name-independent routing with minimum stretch., , , , and . SPAA, page 20-24. ACM, (2004)Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness., , , , and . IACR Cryptology ePrint Archive, (2019)On Approximate Distance Labels and Routing Schemes with Affine Stretch., and . DISC, volume 6950 of Lecture Notes in Computer Science, page 404-415. Springer, (2011)Compact Routing for Graphs Excluding a Fixed Minor., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 442-456. Springer, (2005)Using petal-decompositions to build a low stretch spanning tree., and . STOC, page 395-406. ACM, (2012)Fully dynamic approximate distance oracles for planar graphs via forbidden-set distance labels., , and . STOC, page 1199-1218. ACM, (2012)Byzantine disk paxos: optimal resilience with byzantine shared memory., , , and . PODC, page 226-235. ACM, (2004)Forbidden-set distance labels for graphs of bounded doubling dimension., , , and . PODC, page 192-200. ACM, (2010)Distributed SSH Key Management with Proactive RSA Threshold Signatures., , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 22-43. Springer, (2018)