Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Feigenbaum, Joan
add a person with the name Feigenbaum, Joan
 

Other publications of authors with the same name

Approximation and collusion in multicast cost sharing., , , , and . Games and Economic Behavior, 47 (1): 36-71 (2004)An Approximate L1-Difference Algorithm for Massive Data Streams., , , and . SIAM J. Comput., 32 (1): 131-151 (2002)Equipartitions of graphs., , and . Discrete Mathematics, 91 (3): 239-248 (1990)A Formal Framework for Evaluating Heuristic Programs., , and . Ann. Math. Artif. Intell., 22 (3-4): 193-206 (1998)Mechanism design for policy routing., , and . Distributed Computing, 18 (4): 293-305 (2006)Flexibility as an Instrument in Digital Rights Management., , , and . WEIS, (2005)Panel Session - Future Directions., , , , and . Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, page 227-239. Springer, (1998)On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do., and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 266-279. Springer, (2018)Recognizing Composite Graphs is Equivalent to Testing Graph Isomorphism., and . SIAM J. Comput., 15 (2): 619-627 (1986)Open, privacy-preserving protocols for lawful surveillance., , and . CoRR, (2016)