Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme., , , , and . IACR Cryptology ePrint Archive, (2008)On the Provable Security of Multi-Receiver Signcryption Schemes., , , , and . IACR Cryptology ePrint Archive, (2008)Portfolio Allocation for Sellers in Online Advertising., , , and . CoRR, (2015)Impact of information in a simple multiagent collaborative task., , , and . CDC, page 4543-4548. IEEE, (2015)Demand Prediction and Placement Optimization for Electric Vehicle Charging Stations., , , , , and . IJCAI, page 3117-3123. IJCAI/AAAI Press, (2016)Managing Overstaying Electric Vehicles in Park-and-Charge Facilities., , and . IJCAI, page 2465-2471. IJCAI/AAAI Press, (2016)Dispatching to incentivize fast service in multi-server queues., , and . SIGMETRICS Perform. Evaluation Rev., 39 (3): 43-45 (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , and . IACR Cryptology ePrint Archive, (2008)Potential games are necessary to ensure pure nash equilibria in cost sharing games., , and . EC, page 563-564. ACM, (2013)Stable utility design for distributed resource allocation., , and . CDC, page 1161-1166. IEEE, (2014)