Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Java Security: A Ten Year Retrospective.. ACSAC, page 395-405. IEEE Computer Society, (2009)User Authentication and Authorization in the Java(tm) Platform., , , , and . ACSAC, page 285-290. IEEE Computer Society, (1999)A Secure Identity-Based Capability System.. IEEE Symposium on Security and Privacy, page 56-63. IEEE Computer Society, (1989)The complexity and composability of secure interoperation., and . IEEE Symposium on Security and Privacy, page 190-200. IEEE Computer Society, (1994)Ensuring Assurance in Mobile Computing., , , , , and . IEEE Symposium on Security and Privacy, page 114-118. IEEE Computer Society, (1997)Collisionful Keyed Hash Functions with Selectable Collisions.. Inf. Process. Lett., 55 (3): 167-170 (1995)Tutorial: Peer to Peer Networks in Action.. IEEE Distributed Systems Online, (2002)Case Injected Genetic Algorithms for Traveling Salesman Problems., and . Inf. Sci., 122 (2-4): 201-225 (2000)Computational Issues in Secure Interoperation., and . IEEE Trans. Software Eng., 22 (1): 43-52 (1996)Implementing Protection Domains in the JavaTM Development Kit 1.2., and . NDSS, The Internet Society, (1998)