Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees., , , and . IACR Cryptol. ePrint Arch., (2020)From Secure Messaging to Secure Collaboration (Transcript of Discussion).. Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 186-191. Springer, (2018)A Critique of the CAP Theorem.. CoRR, (2015)Verifying strong eventual consistency in distributed systems., , , and . Proc. ACM Program. Lang., 1 (OOPSLA): 109:1-109:28 (2017)Peritext: A CRDT for Collaborative Rich Text Editing., , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-36 (2022)The Art of the Fugue: Minimizing Interleaving in Collaborative Text Editing., , and . CoRR, (2023)Moving elements in list CRDTs.. PaPoC@EuroSys, page 4:1-4:6. ACM, (2020)Making CRDTs Byzantine fault tolerant.. PaPoC@EuroSys, page 8-15. ACM, (2022)Undo and Redo Support for Replicated Registers., and . PaPoC@EuroSys, page 1-7. ACM, (2024)Strengthening Public Key Authentication Against Key Theft (Short Paper)., and . PASSWORDS, volume 9551 of Lecture Notes in Computer Science, page 144-150. Springer, (2015)