Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Ethereum Fraud Detection., , , and . Blockchain, page 266-273. IEEE, (2019)Key bundles and parcels: Secure communication in many groups., , and . Comput. Networks, 50 (11): 1781-1798 (2006)Optimal Dispersal of Certificate Chains., , and . IEEE Trans. Parallel Distributed Syst., 18 (4): 474-484 (2007)Load-Balanced and Sybil-Resilient File Search in P2P Networks., , and . OPODIS, volume 5401 of Lecture Notes in Computer Science, page 542-545. Springer, (2008)Stabilizing Certificate Dispersal., and . Self-Stabilizing Systems, volume 3764 of Lecture Notes in Computer Science, page 140-152. Springer, (2005)Optimal dispersal of special certificate graphs., , and . GLOBECOM, page 2213-2217. IEEE, (2004)B-APT: Bayesian Anti-Phishing Toolbar., , , , and . ICC, page 1745-1749. IEEE, (2008)Changing young women's perceptions of CS via outreach., and . ITiCSE, page 333. ACM, (2013)An efficient LKH tree balancing algorithm for group key management., , , and . IEEE Communications Letters, 10 (3): 222-224 (2006)Inclusive persuasion for security software adoption., and . SOUPS, USENIX Association, (2017)