Author of the publication

On perfectly secret message transmission in digraphs tolerating dual failures.

, , , and . ICDCN, page 29:1-29:10. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WYSWYE: shoulder surfing defense for recognition based graphical passwords., , and . OZCHI, page 285-294. ACM, (2012)Secret Sharing for mNP: Completeness Results., and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 380-390. (2016)On Generalized Planar Skyline and Convex Hull Range Queries., , , , and . WALCOM, volume 8344 of Lecture Notes in Computer Science, page 34-43. Springer, (2014)Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains., , and . CoRR, (2022)Reporting and counting maximal points in a query orthogonal rectangle., , , and . J. Discrete Algorithms, (2015)Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission., , and . Theor. Comput. Sci., (2013)Perfectly secure message transmission over partially synchronous networks., , and . ICDCN, page 302-306. ACM, (2019)Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots., , , and . ARES, page 600-605. IEEE Computer Society, (2009)Generalized Robust Combiners for Oblivious Transfer., , and . ARES, page 510-515. IEEE Computer Society, (2009)On perfectly secret message transmission in digraphs tolerating dual failures., , , and . ICDCN, page 29:1-29:10. ACM, (2016)