Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Ethereum Fraud Detection., , , and . Blockchain, page 266-273. IEEE, (2019)Optimal dispersal of special certificate graphs., , and . GLOBECOM, page 2213-2217. IEEE, (2004)Load-Balanced and Sybil-Resilient File Search in P2P Networks., , and . OPODIS, volume 5401 of Lecture Notes in Computer Science, page 542-545. Springer, (2008)Optimal Dispersal of Certificate Chains., , and . IEEE Trans. Parallel Distributed Syst., 18 (4): 474-484 (2007)B-APT: Bayesian Anti-Phishing Toolbar., , , , and . ICC, page 1745-1749. IEEE, (2008)Stabilizing Certificate Dispersal., and . Self-Stabilizing Systems, volume 3764 of Lecture Notes in Computer Science, page 140-152. Springer, (2005)Key bundles and parcels: Secure communication in many groups., , and . Comput. Networks, 50 (11): 1781-1798 (2006)Changing young women's perceptions of CS via outreach., and . ITiCSE, page 333. ACM, (2013)Rating Certificates., and . ICCCN, page 449-454. IEEE, (2006)Vulnerability analysis of certificate graphs., and . Int. J. Secur. Networks, 1 (1/2): 13-23 (2006)