Author of the publication

Building Trustworthy Systems: Lessons from the PTN and Internet.

, , and . IEEE Internet Comput., 3 (6): 64-72 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications., , , , , and . I. J. Network Security, 4 (1): 69-80 (2007)Transport-Friendly ESP.. NDSS, The Internet Society, (1999)Implementing Pushback: Router-Based Defense Against DDoS Attacks., and . NDSS, The Internet Society, (2002)The Insider Attack Problem Nature and Scope.. Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)IP Traceback.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)A Look Back at "Security Problems in the TCP/IP Protocol Suite".. ACSAC, page 229-249. IEEE Computer Society, (2004)The Government and Cybersecurity.. IEEE Security & Privacy, 7 (2): 96 (2009)What Should Crypto Look Like?. IEEE Security & Privacy, 12 (6): 108 (2014)Clouds from Both Sides.. IEEE Security & Privacy, 9 (3): 88 (2011)A study of privacy settings errors in an online social network., , and . PerCom Workshops, page 340-345. IEEE Computer Society, (2012)