dblp.uni-trier.dewww.uni-trier.de

Adrian Perrig Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
103EEAhren Studer, Adrian Perrig: The Coremelt Attack. ESORICS 2009: 37-52
102EEXin Zhang, Adrian Perrig, Hui Zhang: Centaur: A Hybrid Approach for Reliable Policy-Based Routing. ICDCS 2009: 76-84
101EEBryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig: CLAMP: Practical Prevention of Large-Scale Data Leaks. IEEE Symposium on Security and Privacy 2009: 154-169
100EEYue-Hsun Lin, Ahren Studer, Hsu-Chin Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang: SPATE: small-group PKI-less authenticated trust establishment. MobiSys 2009: 1-14
99EEJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Safe Passage for Passwords and Other Sensitive Data. NDSS 2009
98EECynthia Kuo, Adrian Perrig, Jesse Walker: Designing user studies for security applications: a case study with wireless network configuration. IJSN 4(1/2): 101-109 (2009)
97EEJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Seeing-Is-Believing: using camera phones for human-verifiable authentication. IJSN 4(1/2): 43-56 (2009)
96EEQing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe: SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Security and Communication Networks 2(4): 325-340 (2009)
2008
95EEHaowen Chan, Adrian Perrig: Efficient security primitives derived from a secure aggregation algorithm. ACM Conference on Computer and Communications Security 2008: 521-534
94EEBryan Parno, Adrian Perrig, Dave Andersen: SNAPP: stateless network-authenticated path pinning. ASIACCS 2008: 168-178
93EEQing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe: SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. ASIACCS 2008: 201-204
92EEJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25
91EEXin Zhang, Abhishek Jain, Adrian Perrig: Packet-dropping adversary identification for data plane security. CoNEXT 2008: 24
90EEArvind Seshadri, Mark Luk, Adrian Perrig: SAKE: Software Attestation for Key Establishment in Sensor Networks. DCOSS 2008: 372-385
89EEJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki: Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328
88EEAlessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig: Countermeasures against Government-Scale Monetary Forgery. Financial Cryptography 2008: 262-266
87EEChia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu: GAnGS: gather, authenticate 'n group securely. MOBICOM 2008: 92-103
86EEPo-Yuan Teng, Shih-I Huang, Adrian Perrig: Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. SEC 2008: 705-709
85EEEiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig: Use Your Illusion: secure authentication usable anywhere. SOUPS 2008: 35-45
84EEDan Wendlandt, David G. Andersen, Adrian Perrig: Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. USENIX Annual Technical Conference 2008: 321-334
83EEYu-Tso Chen, Ahren Studer, Adrian Perrig: Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. WCNC 2008: 2804-2809
82EECynthia Kuo, Ahren Studer, Adrian Perrig: Mind your manners: socially appropriate wireless key establishment for groups. WISEC 2008: 125-130
81EEJason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn: Towards Sound Detection of Virtual Machines. Botnet Detection 2008: 89-116
80EEKarthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica: Securing user-controlled routing infrastructures. IEEE/ACM Trans. Netw. 16(3): 549-561 (2008)
2007
79EEAkira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig: Intrusion Detection for Encrypted Web Accesses. AINA Workshops (1) 2007: 569-576
78EEHeejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig: BASE: an incrementally deployable mechanism for viable IP spoofing prevention. ASIACCS 2007: 20-31
77EECynthia Kuo, Jesse Walker, Adrian Perrig: Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. Financial Cryptography 2007: 325-340
76EEJonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: Minimal TCB Code Execution. IEEE Symposium on Security and Privacy 2007: 267-272
75EEElaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig: Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007: 350-364
74EEMark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488
73EEBryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu: Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300
72EEArvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SOSP 2007: 335-350
71EECynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig: Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. SenSys 2007: 233-246
70EERamu Panayappan, Jayini Mukul Trivedi, Ahren Studer, Adrian Perrig: VANET-based approach for parking space availability. Vehicular Ad Hoc Networks 2007: 75-76
69EEMahadev Satyanarayanan, Benjamin Gilbert, Matt Toups, Niraj Tolia, Ajay Surie, David R. O'Hallaron, Adam Wolbach, Jan Harkes, Adrian Perrig, David J. Farber, Michael Kozuch, Casey Helfrich, Partho Nath, H. Andrés Lagar-Cavilla: Pervasive Personal Computing in an Internet Suspend/Resume System. IEEE Internet Computing 11(2): 16-25 (2007)
68EEAjay Surie, Adrian Perrig, Mahadev Satyanarayanan, David J. Farber: Rapid Trust Establishment for Pervasive Personal Computing. IEEE Pervasive Computing 6(4): 24-30 (2007)
67EEHaowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song: SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15(1): 69-102 (2007)
2006
66EEHaowen Chan, Adrian Perrig, Dawn Xiaodong Song: Secure hierarchical in-network aggregation in sensor networks. ACM Conference on Computer and Communications Security 2006: 278-287
65EEBryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig: Secure sensor network routing: a clean-slate approach. CoNEXT 2006: 11
64EEBryan Parno, Cynthia Kuo, Adrian Perrig: Phoolproof Phishing Prevention. Financial Cryptography 2006: 1-19
63EEAdrian Perrig: Security in sensor networks: industry trends, present and future research directions. IPSN 2006: 1
62EEMark Luk, Adrian Perrig, Bram Whillock: Seven cardinal properties of sensor network broadcast authentication. SASN 2006: 147-156
61EEHaowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang: Modeling adoptability of secure BGP protocol. SIGCOMM 2006: 279-290
60EEHaowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang: Modeling adoptability of secure BGP protocols. SIGMETRICS/Performance 2006: 389-390
59EEJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX Annual Technical Conference, General Track 2006: 185-198
58EEAdrian Perrig: Security in sensor networks: industry trends, present and future research directions. Workshop on Wireless Security 2006: 53
57EEArvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: SCUBA: Secure Code Update By Attestation in sensor networks. Workshop on Wireless Security 2006: 85-94
56EEArvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: Externally verifiable code execution. Commun. ACM 49(9): 45-49 (2006)
55EEAbraham Yaar, Adrian Perrig, D. Song: StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications 24(10): 1853-1863 (2006)
54EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2): 370-380 (2006)
53EECynthia Kuo, Adrian Perrig, Jesse Walker: Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. Interactions 13(3): 28-31 (2006)
2005
52EEYih-Chun Hu, Markus Jakobsson, Adrian Perrig: Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441
51EEHaowen Chan, Mark Luk, Adrian Perrig: Using Clustering Information for Sensor Network Localization. DCOSS 2005: 109-125
50EEJonathan M. McCune, Adrian Perrig, Michael K. Reiter: Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. IEEE Symposium on Security and Privacy 2005: 110-124
49EEElaine Shi, Adrian Perrig, Leendert van Doorn: BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. IEEE Symposium on Security and Privacy 2005: 154-168
48EEBryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63
47EEJonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Symposium on Security and Privacy 2005: 64-78
46EEAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song: FIT: fast Internet traceback. INFOCOM 2005: 1395-1406
45EEHaowen Chan, Adrian Perrig: PIKE: peer intermediaries for key establishment in sensor networks. INFOCOM 2005: 524-535
44EEArvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SOSP 2005: 1-16
43EEHaowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005)
42EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2): 21-38 (2005)
2004
41 Markus Jakobsson, Adrian Perrig: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 ACM 2004
40EEHaowen Chan, Adrian Perrig: ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. EWSN 2004: 154-171
39EERoss J. Anderson, Haowen Chan, Adrian Perrig: Key Infection: Smart Trust for Smart Dust. ICNP 2004: 206-215
38EEAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. IEEE Symposium on Security and Privacy 2004: 130-
37EEArvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: SWATT: SoftWare-based ATTestation for Embedded Devices. IEEE Symposium on Security and Privacy 2004: 272-
36EEJames Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268
35EEChris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar: Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004
34EEKarthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica: Brief announcement: towards a secure indirection infrastructure. PODC 2004: 383
33EEYih-Chun Hu, Adrian Perrig, Marvin A. Sirbu: SPV: secure path vector routing for securing BGP. SIGCOMM 2004: 179-192
32EEYongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004)
31EEAdrian Perrig, John A. Stankovic, David Wagner: Security in wireless sensor networks. Commun. ACM 47(6): 53-57 (2004)
30EEKarthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica: Taming IP packet flooding attacks. Computer Communication Review 34(1): 45-50 (2004)
29EEYih-Chun Hu, Adrian Perrig: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3): 28-39 (2004)
28EEYongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004)
2003
27 W. Douglas Maughan, Adrian Perrig: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003 ACM 2003
26EEHaowen Chan, Adrian Perrig, Dawn Xiaodong Song: Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Security and Privacy 2003: 197-
25EEAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song: Pi: A Path Identification Mechanism to Defend against DDoS Attack. IEEE Symposium on Security and Privacy 2003: 93-
24EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. INFOCOM 2003
23EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Efficient Security Mechanisms for Routing Protocolsa. NDSS 2003
22EEBartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig: SIA: secure information aggregation in sensor networks. SenSys 2003: 255-265
21EENiraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig: Opportunistic Use of Content Addressable Storage for Distributed File Systems. USENIX Annual Technical Conference, General Track 2003: 127-140
20EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Rushing attacks and defense in wireless ad hoc network routing protocols. Workshop on Wireless Security 2003: 30-40
19EEYih-Chun Hu, David B. Johnson, Adrian Perrig: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1(1): 175-192 (2003)
18EEHaowen Chan, Adrian Perrig: Security and Privacy in Sensor Networks. IEEE Computer 36(10): 103-105 (2003)
2002
17EEYih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: a secure on-demand routing protocol for ad hoc networks. MOBICOM 2002: 12-23
16EEYih-Chun Hu, David B. Johnson, Adrian Perrig: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13
15 Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5): 521-534 (2002)
2001
14EEAdrian Perrig: The BiBa one-time signature and broadcast authentication protocol. ACM Conference on Computer and Communications Security 2001: 28-37
13EEDawn Xiaodong Song, Adrian Perrig, Doantam Phan: AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. CAV 2001: 241-245
12EEAdrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247-
11EEDawn Xiaodong Song, Adrian Perrig: Advanced and Authenticated Marking Schemes for IP Traceback. INFOCOM 2001: 878-886
10 Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170
9EEAdrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar: SPINS: security protocols for sensor netowrks. MOBICOM 2001: 189-199
8EEAdrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001
7 Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244
6 Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig: Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. Journal of Computer Security 9(1/2): 47-74 (2001)
2000
5EEYongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244
4EEAdrian Perrig, D. Song: Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. CSFW 2000: 64-76
3EEDawn Xiaodong Song, David Wagner, Adrian Perrig: Practical Techniques for Searches on Encrypted Data. IEEE Symposium on Security and Privacy 2000: 44-55
2EEAdrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73
1EEAdrian Perrig, Dawn Xiaodong Song: A First Step Towards the Automatic Generation of Security Protocols. NDSS 2000

Coauthor Index

1Alessandro Acquisti [88]
2Daniel Adkins [30] [34] [80]
3Dave Andersen [94]
4David G. Andersen [84] [101]
5Ross J. Anderson [39]
6Sergey Berezin [6]
7John Bethencourt [75]
8Thomas C. Bressoud [21]
9Ran Canetti [2] [8]
10Haowen Chan [18] [26] [39] [40] [43] [45] [51] [60] [61] [66] [67] [95]
11T.-H. Hubert Chan (Hubert T.-H. Chan) [75]
12Chia-Hsin Owen Chen [87]
13Chung-Wei Chen [87]
14Yu-Tso Chen [83]
15Nicolas Christin [85] [88]
16David E. Culler [9] [15]
17Debabrata Dash [60] [61]
18Rachna Dhamija [85]
19Leendert van Doorn [37] [44] [49] [56] [57] [81]
20David J. Farber [68] [69]
21Jason Franklin [81]
22Evan Gaustad [65]
23Benjamin Gilbert [69]
24Virgil D. Gligor [43] [48] [74]
25Jan Harkes [69]
26Geoffrey Hasker [78]
27Eiji Hayashi [85]
28Casey Helfrich [69]
29Hsu-Chin Hsiao [100]
30Yih-Chun Hu [16] [17] [19] [20] [23] [24] [29] [33] [42] [52] [54] [73] [93] [96]
31Shih-I Huang [86]
32Hiroshi Isozaki [89]
33Abhishek Jain [91]
34Markus Jakobsson [41] [52]
35David B. Johnson [16] [17] [19] [20] [23] [24] [42] [54]
36Chris Karlof [35]
37Brad Karp [21]
38Pradeep K. Khosla [37] [44] [56] [57]
39Yongdae Kim [5] [7] [28] [32]
40Michael Kozuch [21] [69]
41Maxwell N. Krohn [100]
42Cynthia Kuo [53] [64] [71] [77] [82] [87] [98]
43Minjin Kwon [78]
44H. Andrés Lagar-Cavilla [69]
45Yan-Hao Lai [87]
46Karthik Lakshminarayanan [30] [34] [80]
47Heejo Lee [78]
48Qing Li [93] [96]
49Yaping Li [35]
50Phen-Lan Lin [100]
51Yue-Hsun Lin [100]
52Mark Luk [44] [51] [56] [57] [62] [65] [71] [72] [74] [81] [90]
53Bruce M. Maggs [73]
54W. Douglas Maughan [27]
55Jonathan M. McCune [47] [50] [59] [76] [81] [87] [89] [92] [97] [99] [100] [101]
56Ghita Mezzour [74]
57Yutaka Miyake [79]
58Gautam Muralidharan [43]
59Partho Nath [69]
60Rohit Negi [71]
61James Newsome [36]
62David R. O'Hallaron [69]
63Ramu Panayappan [70]
64Bryan Parno [48] [64] [65] [73] [76] [88] [89] [92] [94] [101]
65Doantam Phan [13]
66Bartosz Przydatek [22] [67]
67Ning Qu [72]
68Michael K. Reiter [47] [50] [59] [76] [89] [92] [97] [99]
69Naveen Sastry [35]
70Mahadev Satyanarayanan (M. Satyanarayanan) [21] [68] [69]
71Arvind Seshadri [37] [44] [56] [57] [72] [76] [81] [90] [92]
72Elaine Shi [36] [44] [47] [49] [73] [75]
73Marvin A. Sirbu [33]
74Sean W. Smith [10]
75D. Song [4] [55]
76Dawn Xiaodong Song (Dawn Song) [1] [2] [3] [6] [8] [10] [11] [12] [13] [22] [25] [26] [36] [38] [46] [66] [67] [75]
77John A. Stankovic [31]
78Ion Stoica [30] [34] [80]
79Ahren Studer [70] [79] [82] [83] [87] [100] [103]
80Hung-Min Sun [100]
81Ajay Surie [68] [69]
82Robert Szewczyk [9] [15]
83Keisuke Takemori [79]
84Po-Yuan Teng [86]
85Niraj Tolia [21] [69]
86Matt Toups [69]
87Wade Trappe [93] [96]
88Jayini Mukul Trivedi [70]
89Gene Tsudik [5] [7] [28] [32]
90J. Doug Tygar (J. D. Tygar) [2] [8] [9] [10] [12] [15] [35]
91David Wagner [3] [31]
92Jesse Walker [53] [77] [93] [96] [98]
93King-Hang Wang [100]
94Victor Wen [9] [15]
95Dan Wendlandt [73] [84] [101]
96Bram Whillock [62]
97Adam Wolbach [69]
98Tzong-Chen Wu [87]
99Abraham Yaar [25] [38] [46] [55]
100Akira Yamada [79]
101Bo-Yin Yang [87] [100]
102Hui Zhang [60] [61] [102]
103Xin Zhang [91] [102]
104Meiyuan Zhao [93] [96]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)