Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data., , , and . WPES@CCS, page 101-110. ACM, (2015)Information Assurance Technology Forecast 2008., , , , , , and . IEEE Secur. Priv., 6 (1): 16-23 (2008)How to avoid cost of causal communication in large-scale Systems., and . ACM SIGOPS European Workshop, page 106-111. ACM, (1994)Security Made, Not Perfect, But Automatic.. Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 217-223. Springer, (2010)Security Made, Not Perfect, But Automatic (Transcript of Discussion).. Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 224-232. Springer, (2010)Architecture and Implementation of an Embedded Wormhole., , and . SIES, page 341-344. IEEE, (2007)The impact of group communication paradigms on groupware support., and . FTDCS, page 207-215. IEEE Computer Society, (1995)Dependable Adaptive Real-Time Applications in Wormhole-based Systems., , , and . DSN, page 567-. IEEE Computer Society, (2004)Node Failure Detection and Membership in CANELy., , and . DSN, page 331-340. IEEE Computer Society, (2003)Using Atomic Broadcast to Implement a posteriori Agreement for Clock Synchronization., , and . SRDS, page 115-124. IEEE Computer Society, (1993)