|
Search the dblp DataBase
Ahren Studer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ahren Studer, Chenxi Wang
Adaptive Detection of Local Scanners. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:1-17 [Conf]
- Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig
Intrusion Detection for Encrypted Web Accesses. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:569-576 [Conf]
- Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang
Empirical Analysis of Rate Limiting Mechanisms. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:22-42 [Conf]
- Yutao Zhong, Steven G. Dropsho, Xipeng Shen, Ahren Studer, Chen Ding
Miss Rate Prediction Across Program Inputs and Cache Configurations. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2007, v:56, n:3, pp:328-343 [Journal]
A Survey to Guide Group Key Protocol Development. [Citation Graph (, )][DBLP]
A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP]
The Coremelt Attack. [Citation Graph (, )][DBLP]
VANET-based approach for parking space availability. [Citation Graph (, )][DBLP]
GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP]
SPATE: small-group PKI-less authenticated trust establishment. [Citation Graph (, )][DBLP]
Mobile user location-specific encryption (MULE): using your office as your password. [Citation Graph (, )][DBLP]
Mind your manners: socially appropriate wireless key establishment for groups. [Citation Graph (, )][DBLP]
Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|