Author of the publication

Credentials and Beliefs in Remote Trusted Platforms Attestation.

, , and . WOWMOM, page 662-667. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hop-Congestion Trade-Offs for High-Speed Networks., , and . Int. J. Found. Comput. Sci., 8 (2): 117-126 (1997)Heterogeneous Server Placement in the Network Centric Computing Paradigm., and . OPODIS, page 153-166. Hermes, (1997)Boolean Routing on Cayley Networks., and . SIROCCO, page 119-124. Carleton Scientific, (1996)Tracking Users in Cellular Networks using Timing Information., , and . SIROCCO, volume 17 of Proceedings in Informatics, page 223-234. Carleton Scientific, (2003)Optimal packing of similar triangles., and . Bulletin of the EATCS, (1989)Mobile Agents and Exploration., and . Encyclopedia of Algorithms, (2016)Stepping Up Lemmas in Definable Partitions.. J. Symb. Log., 49 (1): 22-31 (1984)The Hotlink Optimizer., , and . International Conference on Internet Computing, page 87-94. CSREA Press, (2002)Excuse Me! or The Courteous Theatregoers' Problem., , and . CoRR, (2014)Enhancing intrusion detection in wireless networks using radio frequency fingerprinting., , and . Communications, Internet, and Information Technology, page 201-206. IASTED/ACTA Press, (2004)