Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Expected Constant-Round Protocols for Byzantine Agreement., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 445-462. Springer, (2006)On-Line Scheduling with Tight Deadlines., , , and . MFCS, volume 2136 of Lecture Notes in Computer Science, page 464-473. Springer, (2001)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 323-341. Springer, (2007)On expected constant-round protocols for Byzantine agreement., and . J. Comput. Syst. Sci., 75 (2): 91-112 (2009)TFX: A TensorFlow-Based Production-Scale Machine Learning Platform., , , , , , , , , and 12 other author(s). KDD, page 1387-1395. ACM, (2017)Round-Efficient Secure Computation in Point-to-Point Networks., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 311-328. Springer, (2007)Broadcast in radio networks tolerating byzantine adversarial behavior.. PODC, page 275-282. ACM, (2004)Reliable broadcast in radio networks: the bounded collision case., , , and . PODC, page 258-264. ACM, (2006)Extra processors versus future information in optimal deadline scheduling., , , and . SPAA, page 133-142. ACM, (2002)Secure Computation with Partial Message Loss.. TCC, volume 3876 of Lecture Notes in Computer Science, page 502-521. Springer, (2006)