Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes., , and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 434-444. Springer, (2006)BAFi: a practical cryptographic secure audit logging scheme for digital forensics., and . Secur. Commun. Networks, 8 (17): 3180-3190 (2015)Lattice-Based Public Key Searchable Encryption from Experimental Perspectives., , and . IEEE Trans. Dependable Secur. Comput., 17 (6): 1269-1282 (2020)Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.. DBSec, volume 7964 of Lecture Notes in Computer Science, page 179-194. Springer, (2013)Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things., and . ACSAC, page 119-130. ACM, (2021)Three-tier satellite multicast security protocol based on ECMQV and IMC methods., , and . CAMAD, page 129-136. IEEE, (2006)Practical and secure dynamic searchable encryption via oblivious access on distributed data structure., , and . ACSAC, page 302-313. ACM, (2016)Anonymous Dynamic Spectrum Access and Sharing Mechanisms for the CBRS Band., , , and . IEEE Access, (2021)Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities., , , , and . CoRR, (2023)A Comprehensive Survey of Threshold Digital Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications., and . CoRR, (2023)