default search action
Thomas Locher
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Thomas Locher:
Byzantine Reliable Broadcast with Low Communication and Time Complexity. OPODIS 2024: 16:1-16:17 - [i6]Thomas Locher:
Byzantine Reliable Broadcast with Low Communication and Time Complexity. CoRR abs/2404.08070 (2024) - [i5]Thomas Locher, Victor Shoup:
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast. IACR Cryptol. ePrint Arch. 2024: 571 (2024) - 2021
- [c32]Sonia Bogos, Dario Korolija, Thomas Locher, Serge Vaudenay:
Towards Efficient LPN-Based Symmetric Encryption. ACNS (2) 2021: 208-230 - [c31]Arash Golibagh Mahyari, Thomas Locher:
Robust Predictive Maintenance for Robotics via Unsupervised Transfer Learning. FLAIRS 2021 - 2020
- [c30]Thomas Locher:
Fast Byzantine Agreement for Permissioned Distributed Ledgers. SPAA 2020: 371-382
2010 – 2019
- 2018
- [c29]Thomas Locher, Sebastian Obermeier, Yvonne-Anne Pignolet:
When Can a Distributed Ledger Replace a Trusted Third Party? iThings/GreenCom/CPSCom/SmartData 2018: 1069-1077 - [e1]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy H. Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley L. Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - [i4]Thomas Locher, Sebastian Obermeier, Yvonne-Anne Pignolet:
When Can a Distributed Ledger Replace a Trusted Third Party? CoRR abs/1806.10929 (2018) - 2017
- [j5]Stephan Holzer, Thomas Locher, Yvonne-Anne Pignolet, Roger Wattenhofer:
Deterministic multi-channel information exchange. J. Comput. Syst. Sci. 87: 84-103 (2017) - [c28]Matús Harvan, Samuel Kimoto, Thomas Locher, Yvonne-Anne Pignolet, Johannes Schneider:
Processing Encrypted and Compressed Time Series Data. ICDCS 2017: 1053-1062 - [c27]Matús Harvan, Thomas Locher, Marta Mularczyk, Yvonne-Anne Pignolet:
Privacy-preserving Regression on Partially Encrypted Data. SECRYPT 2017: 255-266 - 2016
- [c26]Matús Harvan, Thomas Locher, Ana Claudia Sima:
Cyclone: Unified Stream and Batch Processing. ICPP Workshops 2016: 220-229 - [c25]Raphael Eidenbenz, Thomas Locher:
Task allocation for distributed stream processing. INFOCOM 2016: 1-9 - [c24]Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier:
Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. SECRYPT 2016: 49-60 - [i3]Raphael Eidenbenz, Thomas Locher:
Task Allocation for Distributed Stream Processing. CoRR abs/1601.06060 (2016) - [i2]Johannes Schneider, Thomas Locher:
Obfuscation using Encryption. CoRR abs/1612.03345 (2016) - 2015
- [c23]Alexandra Moga, Thomas Locher:
Scalable and reliable monitoring for power systems. SmartGridComm 2015: 259-264 - 2014
- [c22]Robin Chapas, Ana Hristova, Thomas Locher, Sebastian Obermeier:
Securing Industrial Control Systems through Autonomous Hardening. ICS-CSR 2014 - [c21]Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. WISEC 2014: 99-104 - 2012
- [c20]Raphael Eidenbenz, Thomas Locher, Stefan Schmid, Roger Wattenhofer:
Boosting market liquidity of peer-to-peer systems through cyclic trading. P2P 2012: 155-166 - [c19]Stephan Holzer, Thomas Locher, Yvonne-Anne Pignolet, Roger Wattenhofer:
Deterministic multi-channel information exchange. SPAA 2012: 109-120 - 2011
- [j4]Thomas Locher, Stefan Schmid, Roger Wattenhofer:
eDonkey & eMule's Kad: Measurements & Attacks. Fundam. Informaticae 109(4): 383-403 (2011) - [j3]Fabian Kuhn, Thomas Locher, Rotem Oshman:
Gradient Clock Synchronization in Dynamic Networks. Theory Comput. Syst. 49(4): 781-816 (2011) - [c18]Raphael Eidenbenz, Thomas Locher, Roger Wattenhofer:
Hidden communication in P2P networks Steganographic handshake and broadcast. INFOCOM 2011: 954-962 - [c17]Thomas Locher:
Finding heavy distinct hitters in data streams. SPAA 2011: 299-308 - 2010
- [j2]Christoph Lenzen, Thomas Locher, Roger Wattenhofer:
Tight bounds for clock synchronization. J. ACM 57(2): 8:1-8:42 (2010) - [c16]Thomas Locher, David Mysicka, Stefan Schmid, Roger Wattenhofer:
Poisoning the Kad Network. ICDCN 2010: 195-206 - [c15]Fabian Kuhn, Christoph Lenzen, Thomas Locher, Rotem Oshman:
Optimal gradient clock synchronization in dynamic networks. PODC 2010: 430-439 - [c14]Christoph Lenzen, Thomas Locher, Philipp Sommer, Roger Wattenhofer:
Clock Synchronization: Open Problems in Theory and Practice. SOFSEM 2010: 61-70 - [i1]Fabian Kuhn, Christoph Lenzen, Thomas Locher, Rotem Oshman:
Optimal Gradient Clock Synchronization in Dynamic Networks. CoRR abs/1005.2894 (2010)
2000 – 2009
- 2009
- [b1]Thomas Locher:
Foundations of aggregation and synchronization in distributed systems. ETH Zurich, 2009, ISBN 978-3-86628-254-4, pp. 1- - [c13]Thomas Locher, Remo Meier, Roger Wattenhofer, Stefan Schmid:
Robust live media streaming in swarms. NOSSDAV 2009: 121-126 - [c12]Christoph Lenzen, Thomas Locher, Roger Wattenhofer:
Tight bounds for clock synchronization. PODC 2009: 46-55 - [c11]Fabian Kuhn, Thomas Locher, Rotem Oshman:
Gradient clock synchronization in dynamic networks. SPAA 2009: 270-279 - 2008
- [j1]Fabian Kuhn, Thomas Locher, Roger Wattenhofer:
Distributed selection: a missing piece of data aggregation. Commun. ACM 51(9): 93-99 (2008) - [c10]Christoph Lenzen, Thomas Locher, Roger Wattenhofer:
Clock Synchronization with Bounded Global and Local Skew. FOCS 2008: 509-518 - [c9]Thomas Locher, Pascal von Rickenbach, Roger Wattenhofer:
Sensor Networks Continue to Puzzle: Selected Open Problems. ICDCN 2008: 25-38 - [c8]Fabian Kuhn, Thomas Locher, Stefan Schmid:
Distributed computation of the mode. PODC 2008: 15-24 - 2007
- [c7]Thomas Locher, Stefan Schmid, Roger Wattenhofer:
Rescuing Tit-for-Tat with Source Coding. Peer-to-Peer Computing 2007: 3-10 - [c6]Fabian Kuhn, Thomas Locher, Roger Wattenhofer:
Tight bounds for distributed selection. SPAA 2007: 145-153 - [c5]Thomas Locher, Remo Meier, Stefan Schmid, Roger Wattenhofer:
Push-to-Pull Peer-to-Peer Live Streaming. DISC 2007: 388-402 - 2006
- [c4]Thomas Locher, Patrick Moor, Stefan Schmid, Roger Wattenhofer:
Free Riding in BitTorrent is Cheap. HotNets 2006 - [c3]Thomas Locher, Stefan Schmid, Roger Wattenhofer:
eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System. Peer-to-Peer Computing 2006: 3-11 - [c2]Thomas Locher, Roger Wattenhofer:
Oblivious Gradient Clock Synchronization. DISC 2006: 520-533 - 2005
- [c1]Thomas Locher, Roger Wattenhofer, Aaron Zollinger:
Received-Signal-Strength-Based Logical Positioning Resilient to Signal Fluctuation. SNPD 2005: 396-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint