Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Rights Management., , , , and . The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Efficient Parallel Solutions to Geometric Problems., and . ICPP, page 411-417. IEEE Computer Society Press, (1985)On Estimating the Large Entries of a Convolution.. IEEE Trans. Computers, 50 (3): 193-196 (2001)Efficient Leakage-free Authentication of Trees, Graphs and Forests., , and . IACR Cryptology ePrint Archive, (2012)Dynamic and Efficient Key Management for Access Hierarchies., , , and . ACM Trans. Inf. Syst. Secur., 12 (3): 18:1-18:43 (2009)Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS., , , and . Cloud-I, page 9. ACM, (2012)Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations., , and . J. ACM, 41 (6): 1049-1088 (1994)Leakage-free redactable signatures., , and . CODASPY, page 307-316. ACM, (2012)Key management for non-tree access hierarchies., , and . SACMAT, page 11-18. ACM, (2006)Remote Revocation of Smart Cards in a Private DRM System., , and . ACSW, volume 44 of CRPIT, page 169-178. Australian Computer Society, (2005)