Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interference mitigation techniques in 60 GHz wireless networks., , and . IEEE Communications Magazine, 47 (12): 34-40 (2009)Saliency Diagrams., , , and . SIGGRAPH Asia Technical Briefs, page 49-52. ACM, (2019)From help desk and resnet to "Best Service Center in Town"., , , , and . SIGUCCS, page 27-32. ACM, (2008)When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names., and . WPES@CCS, page 87-92. ACM, (2019)The 2003 Benjamin Franklin Medal in civil engineering presented to Charles H. Thornton.. J. Frankl. Inst., 341 (3): 211-214 (2004)Tale Folks for Jung: Original fairytales for persons of all ages dramatizingC.G. Jung's archetypes of the collective unconscious. Vernal Equinox Press, San Anselmo, CA, (1983)Social behavior and meningococcal carriage in British teenagers, , , , , , , , , and 1 other author(s). Emerging Infectious Diseases, 12 (6): 950--7 (June 2006)PMID: 16707051.Recommendations for the prevention of secondary Haemophilus influenzae type b (Hib) disease, , , , , , , and . Journal of Infection, 58 (1): 3--14 (January 2009)Shallow Types for Insightful Programs: Grace is Optional, Performance is Not., , , and . CoRR, (2018)You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates., , , , , and . ACM Conference on Computer and Communications Security, page 2489-2504. ACM, (2019)