The SCEAS System
Navigation Menu

Search the dblp DataBase


Thomas Y. C. Woo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Y. C. Woo, Simon S. Lam
    Authorizations in Distributed Systems: A New Approach. [Citation Graph (3, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:107-136 [Journal]
  2. Thomas Y. C. Woo, Simon S. Lam
    A Framework for Distributed Authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:112-118 [Conf]
  3. Ramachandran Ramjee, Furquan Ansari, Martin Havemann, T. V. Lakshman, Thyagarajan Nandagopal, Krishan K. Sabnani, Thomas Y. C. Woo
    Separating control software from routers. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  4. Indranil Chakravarty, Michael F. Kleyn, Thomas Y. C. Woo, Rajive Bagrodia, Vernon Austel
    UNITY to UC: A Case Study in the Derivation of Parallel Programs. [Citation Graph (0, 0)][DBLP]
    Research Directions in High-Level Parallel Programming Languages, 1991, pp:6-20 [Conf]
  5. Tian Bu, Samphel Norden, Thomas Y. C. Woo
    Trading Resiliency for Security: Model and Algorithms. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:218-227 [Conf]
  6. Thomas Y. C. Woo, Thomas F. La Porta, Krishan K. Sabnani
    User Agents and Flexible Messages: A New Approach to Wireless Two-Way Messaging. [Citation Graph (0, 0)][DBLP]
    ICNP, 1997, pp:53-62 [Conf]
  7. Mun Choon Chan, Thomas Y. C. Woo
    Cache-Based Compaction: A New Technique for Optimizing Web Transfer. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:117-125 [Conf]
  8. Thomas Y. C. Woo
    A Modular Approach to Packet Classification: Algorithms and Results. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:1213-1222 [Conf]
  9. Arunchandar Vasan, Ramachandran Ramjee, Thomas Y. C. Woo
    ECHOS - enhanced capacity 802.11 hotspots. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1562-1572 [Conf]
  10. Thomas Y. C. Woo, Simon S. Lam
    Designing a Distributed Authorization Service. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:419-429 [Conf]
  11. Thomas Y. C. Woo, Thomas F. La Porta, Jamal Golestani, Naveen Agarwal
    Update and Search Algorithms for Wireless Two-Way Messaging: Design and Performance. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:737-747 [Conf]
  12. Vladimir Lifschitz, Thomas Y. C. Woo
    Answer Sets in General Nonmonotonic Reasoning (Preliminary Report). [Citation Graph (0, 0)][DBLP]
    KR, 1992, pp:603-614 [Conf]
  13. Suvo Mittra, Thomas Y. C. Woo
    A Flow-Based Approach to Datagram Security. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1997, pp:221-234 [Conf]
  14. Simon S. Lam, A. Udaya Shankar, Thomas Y. C. Woo
    Applying a Theory of Modules and Interfaces to Security Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:136-155 [Conf]
  15. Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su, Simon S. Lam
    SNP: An Interface for Secure Network Programming. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1994, pp:45-58 [Conf]
  16. Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S. Sundaram, Thomas Y. C. Woo
    On securely enabling intermediary-based services and performance enhancements for wireless mobile users. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:61-68 [Conf]
  17. Tian Bu, Samphel Norden, Thomas Y. C. Woo
    A survivable DoS-resistant overlay network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:9, pp:1281-1301 [Journal]
  18. Thomas Y. C. Woo, Simon S. Lam
    Authentification for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1992, v:25, n:1, pp:39-52 [Journal]
  19. Thomas Y. C. Woo, Thomas F. La Porta, Krishan K. Sabnani
    Pigeon: A Wireless Two-Way Messaging System. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:8, pp:1391-1405 [Journal]
  20. Thomas F. La Porta, Ramachandran Ramjee, Thomas Y. C. Woo, Krishan K. Sabnani
    Experiences with Network-Based User Agents for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    MONET, 1998, v:3, n:2, pp:123-141 [Journal]
  21. Thomas Y. C. Woo, Simon S. Lam
    A Lesson on Authentication Protocol Design. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1994, v:28, n:3, pp:24-37 [Journal]
  22. Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
    On the Detection of Signaling DoS Attacks on 3G Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1289-1297 [Conf]
  23. Tian Bu, Aiyou Chen, Scott A. Vander Wiel, Thomas Y. C. Woo
    Design and Evaluation of a Fast and Robust Worm Detection Algorithm. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  24. On the detection of signaling DoS attacks on 3G/WiMax wireless networks. [Citation Graph (, )][DBLP]

Search in 0.176secs, Finished in 0.177secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002