dblp.uni-trier.dewww.uni-trier.de

Angelos D. Keromytis Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
105EEStelios Sidiroglou, Oren Laadan, Carlos Perez, Nicolas Viennot, Jason Nieh, Angelos D. Keromytis: ASSURE: automatic software self-healing using rescue points. ASPLOS 2009: 37-48
104EEAngelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh: A2M: Access-Assured Mobile Desktop Computing. ISC 2009: 186-201
103EEAlex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein: Adding Trust to P2P Distribution of Paid Content. ISC 2009: 459-474
102EEMatthew Burnside, Angelos D. Keromytis: F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. ISC 2009: 491-506
101EEMansoor Alicherry, Angelos D. Keromytis: DoubleCheck: Multi-path verification against man-in-the-middle attacks. ISCC 2009: 557-563
100EEYingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo: Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. NDSS 2009
99EEMatt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee: Dynamic Trust Management. IEEE Computer 42(2): 44-52 (2009)
98EEHyung Chan Kim, Angelos D. Keromytis: On the Deployment of Dynamic Taint Analysis for Application Communities. IEICE Transactions 92-D(3): 548-551 (2009)
97EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Elastic block ciphers: method, security and instantiations. Int. J. Inf. Sec. 8(3): 211-231 (2009)
2008
96 Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ACNS 2008
95EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ACISP 2008: 187-202
94EEAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54
93EEVanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. ACSAC 2008: 367-376
92EEMatthew Burnside, Angelos D. Keromytis: Asynchronous policy evaluation and enforcement. CSAW 2008: 45-50
91EEGabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
90EEVanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis: Behavior-Based Network Access Control: A Proof-of-Concept. ISC 2008: 175-190
89EEMatthew Burnside, Angelos D. Keromytis: Path-Based Access Control for Enterprise Networks. ISC 2008: 191-203
88EEMichael E. Locasto, Matthew Burnside, Angelos D. Keromytis: Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151
87EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
86EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Inscrypt 2008: 157-180
85EEMatthew Burnside, Mack Lu, Angelos D. Keromytis: Authentication on Untrusted Remote Hosts with Public-Key Sudo. LISA 2008: 103-107
84EEScott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter: Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008
83EEStefan Miltchev, Jonathan M. Smith, Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis: Decentralized access control in distributed file systems. ACM Comput. Surv. 40(3): (2008)
2007
82EEYingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
81EEAdam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis: SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139
80EEDebra L. Cook, Angelos D. Keromytis, Moti Yung: Elastic block ciphers: the basic design. ASIACCS 2007: 350-352
79EEAngelos Stavrou, David Turner, Angelos D. Keromytis, Vassilis Prevelakis: Bridging the Network Reservation Gap Using Overlays. COMSWARE 2007
78EEWei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis: A Study of Malcode-Bearing Documents. DIMVA 2007: 231-250
77EEStelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh: Using Rescue Points to Navigate Software Recovery. IEEE Symposium on Security and Privacy 2007: 273-280
76EEDebra L. Cook, Moti Yung, Angelos D. Keromytis: The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ISC 2007: 89-103
75EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis: From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232
74EEAngelos D. Keromytis, Jonathan M. Smith: Requirements for scalable access control and security management architectures. ACM Trans. Internet Techn. 7(2): (2007)
73EEKostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis: COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Int. J. Inf. Sec. 6(6): 361-378 (2007)
2006
72EEAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364
71EEMatthew Burnside, Angelos D. Keromytis: Low Latency Anonymity with Mix Rings. ISC 2006: 32-45
70EEKostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald: Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. ISC 2006: 427-442
69EEMichael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis: Software Self-Healing Using Collaborative Application Communities. NDSS 2006
68EEMichael E. Locasto, Angelos Stavrou, Angelos D. Keromytis: Dark application communities. NSPW 2006: 11-18
67EEAngelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside: Cryptography as an operating system service: A case study. ACM Trans. Comput. Syst. 24(1): 1-38 (2006)
66EEStelios Sidiroglou, Angelos D. Keromytis: Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Sec. 5(2): 77-91 (2006)
2005
65 Vijay Atluri, Angelos D. Keromytis: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 ACM Press 2005
64 John Ioannidis, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings ACNS 2005
63EEAngelos Stavrou, Angelos D. Keromytis: Countering DoS attacks with stateless multipath overlays. ACM Conference on Computer and Communications Security 2005: 249-259
62EEGaurav S. Kc, Angelos D. Keromytis: e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. ACSAC 2005: 286-302
61EESimon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
60EEDebra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350
59EEDebra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis: Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ICICS 2005: 363-375
58EEAbhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis: The effect of DNS delays on worm propagation in an IPv6 Internet. INFOCOM 2005: 2405-2414
57EEStelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis: A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. ISC 2005: 1-15
56EEStephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193
55EEDavid Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture. ISCC 2005: 939-944
54EEStelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108
53EEDebra L. Cook, Angelos D. Keromytis: Conversion and Proxy Functions for Symmetric Key Ciphers. ITCC (1) 2005: 662-667
52EEAngelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein: MOVE: An End-to-End Solution to Network Denial of Service. NDSS 2005
51EEMichael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
50EEStelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis: Building a Reactive Immune System for Software Services. USENIX Annual Technical Conference, General Track 2005: 149-161
49EEDavid Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis: The Bandwidth Exchange Architecture CoRR abs/cs/0504007: (2005)
48EEAngelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: WebSOS: an overlay-based system for protecting web servers from denial of service attacks. Computer Networks 48(5): 781-807 (2005)
47EEStelios Sidiroglou, Angelos D. Keromytis: Countering Network Worms Through Automatic Patch Generation. IEEE Security & Privacy 3(6): 41-49 (2005)
46EEStelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis: Hardware support for self-healing software services. SIGARCH Computer Architecture News 33(1): 42-47 (2005)
45EEMatthew Burnside, Angelos D. Keromytis: The case for crypto protocol awareness inside the OS kernel. SIGARCH Computer Architecture News 33(1): 58-64 (2005)
2004
44EETheodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung: The dual receiver cryptosystem and its applications. ACM Conference on Computer and Communications Security 2004: 330-343
43EEMichael E. Locasto, Angelos D. Keromytis: CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15
42EEAngelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134
41EEStephen W. Boyd, Angelos D. Keromytis: SQLrand: Preventing SQL Injection Attacks. ACNS 2004: 292-302
40EERakan El-Khalil, Angelos D. Keromytis: Hydan: Hiding Information in Program Binaries. ICICS 2004: 187-199
39 Aleksey Kurchuk, Angelos D. Keromytis: Recursive Sandboxes: Extending Systrace To Empower Applications. SEC 2004: 473-488
38EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
37EEAngelos D. Keromytis: "Patch on Demand" Saves Even More Time? IEEE Computer 37(8): 94-96 (2004)
36EEAngelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: an architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1): 176-188 (2004)
2003
35EEGaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis: Countering code-injection attacks with instruction-set randomization. ACM Conference on Computer and Communications Security 2003: 272-280
34EEWilliam G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: Using graphic turing tests to counter automated DDoS attacks against web servers. ACM Conference on Computer and Communications Security 2003: 8-19
33EEAngelos D. Keromytis: Tagging Data in the Network Stack: mbuf_tags. BSDCon 2003: 125-132
32EEAngelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith: The STRONGMAN Architecture. DISCEX (1) 2003: 178-188
31EEMark C. Benvenuto, Angelos D. Keromytis: EasyVPN: IPsec Remote Access Made Easy. LISA 2003: 87-94
30EEMatt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100
29EEMatt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232
28EEStefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Secure and Flexible Global File Sharing. USENIX Annual Technical Conference, FREENIX Track 2003: 165-178
27EEAngelos D. Keromytis, Jason L. Wright, Theo de Raadt: The Design of the {OpenBSD} Cryptographic Framework. USENIX Annual Technical Conference, General Track 2003: 181-196
26EEStelios Sidiroglou, Angelos D. Keromytis: A Network Worm Vaccine Architecture. WETICE 2003: 220-225
25EESotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274
24EEAlexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis: WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64
23EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300
22 Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C 33(3): 413-426 (2003)
2002
21EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
20EEMichael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith: A Secure PLAN. DANCE 2002: 224-237
19EEJohn Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis: Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299
18EEAngelos D. Keromytis, Vishal Misra, Dan Rubenstein: SOS: secure overlay services. SIGCOMM 2002: 61-72
17EEStefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis: A Study of the Relative Costs of Network Security Protocols. USENIX Annual Technical Conference, FREENIX Track 2002: 41-48
16EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002)
2001
15EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40
14EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management for IPsec. NDSS 2001
13EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39
2000
12EESotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith: Implementing a distributed firewall. ACM Conference on Computer and Communications Security 2000: 190-199
11EEJohn Ioannidis, Angelos D. Keromytis: Network security and IPsec (tutorial). ACM Conference on Computer and Communications Security 2000
10EEKostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Scalable Resource Control in Active Networks. IWAN 2000: 343-357
9EENiklas Hallqvist, Angelos D. Keromytis: Implementing Internet Key Exchange (IKE). USENIX Annual Technical Conference, FREENIX Track 2000: 201-214
8EEAngelos D. Keromytis, Jason L. Wright: Transparent Network Security Policy Enforcement. USENIX Annual Technical Conference, FREENIX Track 2000: 215-226
1999
7 Michael W. Hicks, Angelos D. Keromytis: A Secure Plan. IWAN 1999: 307-314
6 Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis: The Role of Trust Management in Distributed Systems Security. Secure Internet Programming 1999: 185-210
5 D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith: Security in Active Networks. Secure Internet Programming 1999: 433-451
4 Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118
3EETheo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos: Cryptography in OpenBSD: An Overview. USENIX Annual Technical Conference, FREENIX Track 1999: 93-101
1998
2EEWilliam A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith: Automated Recovery in a Secure Bootstrap Process. NDSS 1998
1EEMatt Blaze, Joan Feigenbaum, Angelos D. Keromytis: KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). Security Protocols Workshop 1998: 59-63

Coauthor Index

1William Aiello [13] [21] [38]
2D. Scott Alexander [5]
3Mansoor Alicherry [101]
4Kostas G. Anagnostakis [10] [70] [73]
5Elli Androulaki [78]
6William A. Arbaugh [2] [5]
7Vijayalakshmi Atluri (Vijay Atluri) [65]
8Adam J. Aviv [81]
9Ricardo A. Baratto [59]
10Ricardo A. Barrato [104]
11Steven M. Bellovin [12] [13] [21] [25] [38] [96]
12Mark C. Benvenuto [31]
13Matt Blaze [1] [4] [6] [13] [14] [15] [16] [21] [23] [29] [30] [38] [99]
14Alex Boulatov [61]
15Stephen W. Boyd [41] [50]
16Matthew Burnside (Matt Burnside) [45] [67] [71] [85] [88] [89] [92] [102]
17Mark Bush [61]
18Ran Canetti [13] [21] [38]
19Stephen T. Chou [56]
20Debra L. Cook [34] [48] [53] [59] [60] [76] [80] [86] [95] [97]
21Scott E. Coull [84]
22Gabriela F. Cretu-Ciocarlie (Gabriela F. Cretu) [75] [87] [91]
23Theodore Diament [44]
24Rakan El-Khalil [40]
25David J. Farber [2]
26Joan Feigenbaum [1] [6]
27Hanhua Feng [58]
28Simon N. Foley [61]
29Richard Ford [61]
30Vanessa Frías-Martínez [90] [93]
31Rosario Gennaro [96]
32Giannis Giovanidis [57]
33Artur Grabowski [3]
34Michael B. Greenwald (Michael Greenwald) [32] [70] [73]
35Niklas Hallqvist [3] [9]
36Michael W. Hicks (Michael Hicks) [7] [10] [20] [22]
37John Ioannidis [4] [11] [13] [14] [15] [16] [19] [21] [23] [24] [25] [28] [29] [30] [38] [42] [54] [56] [60] [64]
38Sotiris Ioannidis [10] [12] [17] [19] [24] [25] [28] [30] [32] [70] [73] [83]
39Abhinav Kamra [58]
40Sampath Kannan [99]
41Gaurav S. Kc [35] [62]
42Hyung Chan Kim [98]
43Aleksey Kurchuk [39]
44Oren Laadan [77] [105]
45Homin K. Lee [44]
46Insup Lee [99]
47Wenke Lee [99]
48Alexander Levine [24]
49Wei-Jen Li [78]
50Michael E. Locasto [43] [46] [50] [51] [61] [68] [69] [72] [75] [81] [82] [87] [88] [91] [94]
51Mack Lu [85]
52Jake Luck [60]
53Tal Malkin [29]
54John McDermott [61]
55Stefan Miltchev [17] [28] [83]
56Vishal Misra [18] [34] [36] [42] [48] [52] [58]
57Fabian Monrose [84]
58William G. Morein [34] [48]
59Jason Nieh [52] [77] [103] [104] [105]
60Pekka Nikander [30]
61Paul C. van Oorschot [61]
62Carlos Perez [105]
63Shaya Potter [81]
64Vassilis Prevelakis [19] [24] [28] [30] [35] [49] [55] [79] [83]
65Niels Provos [3]
66Theo de Raadt [3] [27] [67]
67Omer Reingold [13] [21] [38]
68Michael K. Reiter [84]
69Dan Rubenstein [18] [34] [36] [42] [48] [52]
70Aviel D. Rubin [29]
71Alex Sherman [103]
72Stelios Sidiroglou [26] [46] [47] [50] [54] [57] [61] [66] [69] [77] [105]
73Abe Singer [61]
74Jonathan M. Smith [2] [5] [10] [12] [20] [22] [25] [28] [32] [74] [83] [99]
75Oleg Sokolsky [99]
76Anil Somayaji [61]
77Yingbo Song [82] [100]
78Angelos Stavrou [34] [42] [48] [52] [56] [63] [68] [72] [75] [78] [79] [82] [87] [91] [94] [103] [104]
79Clifford Stein [103]
80Salvatore J. Stolfo [51] [54] [78] [82] [87] [90] [91] [93] [100]
81Julie Thorpe [61]
82David Turner [79]
83David Michael Turner [49] [55]
84Nicolas Viennot [105]
85Ke Wang [51]
86Charles V. Wright [84]
87Jason L. Wright [8] [27] [67]
88Moti Yung (Mordechai M. Yung) [44] [64] [76] [80] [86] [95] [96] [97]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)