Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of the Internet on Telecommunication Architectures., , , and . Computer Networks, 31 (3): 257-273 (1999)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , and . INFOCOM, page 1577-1585. IEEE, (2010)Secure Vehicular Communication Systems., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks., , , , , , and . NDSS, The Internet Society, (2012)Privacy-Enhancing Technologies for Medical Tests Using Genomic Data., , and . NDSS, The Internet Society, (2013)A Survey of Distributed Enterprise Network and Systems Management Paradigms., , and . J. Network Syst. Manage., 7 (1): 9-26 (1999)Integration of Internet and telecommunications: an architecture for hybrid services., , , and . IEEE Journal on Selected Areas in Communications, 17 (9): 1563-1579 (1999)Modeling and testing object-oriented distributed systems with linear-time temporal logic., , and . Concurrency and Computation: Practice and Experience, 13 (5): 385-420 (2001)A formal model of rational exchange and its application to the analysis of Syverson's protocol., , and . Journal of Computer Security, 12 (3-4): 551-587 (2004)Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , and . IEEE Trans. Dependable Sec. Comput., 5 (4): 208-223 (2008)