Author of the publication

Approximate Message Authentication Codes for N-ary Alphabets.

, , and . IEEE Trans. Inf. Forensics Secur., 1 (1): 56-67 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing reliable server pooling in MANET against byzantine adversaries., , and . IEEE J. Sel. Areas Commun., 24 (2): 357-369 (2006)Threshold Cryptography for Mobile Ad Hoc Networks., , and . SCN, volume 3352 of Lecture Notes in Computer Science, page 91-104. Springer, (2004)Design and analysis of DBMAC, an error localizing message authentication code., , and . GLOBECOM, page 2224-2228. IEEE, (2004)Securing Weakly-Dominating Virtual Backbones in Mobile Ad Hoc Networks., , , and . WOWMOM, page 576-580. IEEE Computer Society, (2006)Improved topology assumptions for threshold cryptography in mobile ad hoc networks., , and . SASN, page 53-62. ACM, (2005)Approximate Message Authentication and Biometric Entity Authentication., , , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 240-254. Springer, (2005)Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions., , and . Ad Hoc Networks, 5 (1): 63-75 (2007)Approximate Message Authentication Codes for N-ary Alphabets., , and . IEEE Trans. Inf. Forensics Secur., 1 (1): 56-67 (2006)