Found 9 results
Author Title Type [ Year(Asc)]
Filters: Author is Volker Roth  [Clear All Filters]
Subramanian, L., Katz R. H., Roth V., Shenker S., & Stoica I. (2005).  Reliable Broadcast in Unknown Fixed-Identity Networks. Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC 2005). 342-351.
Subramanian, L., Roth V., Stoica I., Shenker S., & Katz R. H. (2004).  Listen and Whisper: Security Mechanisms for BGP. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 127-140.
Roth, V. (2002).  Empowering mobile software agents. Proceedings 6th IEEE Mobile Agents Conference.
Roth, V., & Arnold M.. (2002).  Improved Key Management for Digital Watermark Monitoring. Proceedings of SPIE.
Roth, V. (2002).  Java Security Architecture and Extensions. Dr. Dobbs Journal.
Pinsdorf, U.., & Roth V. (2002).  Mobile Agent Interoperability Patterns and Practice. Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems.
Binder, W.., & Roth V. (2002).  Secure Mobile Agent Systems Using Java - Where Are We Heading?. Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).