Author of the publication

Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques.

, , , , and . INFOCOM, page 689-698. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security for the cloud infrastructure: Trusted virtual data center implementation., , , , , , , , , and 2 other author(s). IBM J. Res. Dev., 53 (4): 6 (2009)Information Aggregation and Optimized Actuation in Sensor Networks: Enabling Smart Electrical Grids., , , and . INFOCOM, page 2386-2390. IEEE, (2007)Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 588-614. Springer, (2015)A Framework for Policy-based Admission Control., , and . RFC, (January 2000)Security intelligence for cloud management infrastructures., , , , , , , , and . IBM J. Res. Dev., 60 (4): 11 (2016)Distributed route computation and provisioning in shared mesh optical networks., , , , , and . IEEE J. Sel. Areas Commun., 22 (9): 1626-1639 (2004)Scalable integrity monitoring in virtualized environments., , , and . STC@CCS, page 73-78. ACM, (2010)Extending OSPF routing protocol for shared mesh restoration., , , , , and . LANMAN, page 97-101. IEEE, (2004)Scalable Attestation: A Step toward Secure and Trusted Clouds., , , , , and . IEEE Cloud Comput., 2 (5): 10-18 (2015)TVDc: managing security in the trusted virtual datacenter., , , , , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 40-47 (2008)