The SCEAS System
Navigation Menu

Search the dblp DataBase


James Kempf: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry
    IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:196-211 [Conf]
  2. James Kempf, Warren Harris, Roy D'Souza, Alan Snyder
    Experience with CommonLoops. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1987, pp:214-226 [Conf]
  3. Hans Muller, John R. Rose, James Kempf, Tayloe Stansbury
    The Use of Multimethods and Method Combination in a CLOS Based Window System Interface. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1989, pp:239-253 [Conf]
  4. Jonathan T. Trostle, Hosei Matsuoka, Muhammad Mukarram Bin Tariq, James Kempf, Toshiro Kawahara, Ravi Jain
    Cryptographically Protected Prefixes for Location Privacy in IPv6. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:142-166 [Conf]
  5. James Kempf
    Evolving the Internet Addressing Architecture. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:3- [Conf]
  6. James Kempf
    Integrating Handwriting Recognition into UNIX. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1993, pp:187-204 [Conf]
  7. Walter G. Olthoff, James Kempf
    An Algebraic Specification of Method Combination for the Common Lisp Object System. [Citation Graph (0, 0)][DBLP]
    Lisp and Symbolic Computation, 1989, v:2, n:2, pp:115-152 [Journal]
  8. James Kempf, Ajoy Singh, Jonathan Wood, Atsushi Takeshita, Nat Natarajan
    Link Synchronous Mobile IPv4 Handover Algorithms. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2006, v:12, n:3, pp:321-344 [Journal]
  9. Yuan Sun, Elizabeth M. Belding-Royer, Xia Gao, James Kempf
    Real-time traffic support in heterogeneous mobile networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:4, pp:431-445 [Journal]

  10. On the Use of Admission Control for Better Quality of Security. [Citation Graph (, )][DBLP]

  11. Travelling without Moving: 802.11 Access Points backed by Secure NETLMM. [Citation Graph (, )][DBLP]

  12. Using insurance to increase internet security. [Citation Graph (, )][DBLP]

  13. Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002