Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combinatorial Optimization of Group Key Management., , , and . J. Netw. Syst. Manag., 12 (1): 33-50 (2004)Stack and Queue Layouts for Toruses and Extended Hypercubes., , , and . HICSS, page 1-10. IEEE Computer Society, (2010)Improved Techniques for MCM Layer Assignment., , and . ICCD, page 604-607. IEEE Computer Society, (1994)On Sorting by Prefix Reversals and the Diameter of Pancake Networks., and . Heinz Nixdorf Symposium, volume 678 of Lecture Notes in Computer Science, page 218-227. Springer, (1992)Algorithms and bounds for layer assignment of MCM routing., , and . IEEE Trans. Very Large Scale Integr. Syst., 2 (2): 265-270 (1994)Content Based File Type Detection Algorithms., and . HICSS, page 332. IEEE Computer Society, (2003)Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast., , and . HICSS, IEEE Computer Society, (2006)On the Diameter of the Pancake Network., and . J. Algorithms, 25 (1): 67-94 (1997)IoT security attacks using reverse engineering methods on WSN applications., , and . WF-IoT, page 182-187. IEEE Computer Society, (2016)Towards Trusted Online Dissemination of Consumer Information., , , and . HICSS, IEEE Computer Society, (2004)