Author of the publication

Heuristics for Improving Cryptographic Key Assignment in a Hierarchy.

, , and . AINA Workshops (1), page 531-536. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Algorithm to Check for Polygon Similarity., and . Inf. Process. Lett., 7 (3): 127-128 (1978)Addendum: Information Processing Letters 8(3): 157-158 (1979).Edge-Disjoint Spanning Trees on the Star Network with Applications to Fault Tolerance., and . IEEE Trans. Computers, 45 (2): 174-185 (1996)Corrigendum on Convex Hull Algorithms.. Inf. Process. Lett., 10 (3): 168 (1980)On the Relation between Parallel Real-time Computations and Logarithmic Space., and . IASTED PDCS, page 102-107. IASTED/ACTA Press, (2002)Views for Multilevel Database Security., , , , , , and . IEEE Trans. Software Eng., 13 (2): 129-140 (1987)Quantum security in wireless sensor networks., , and . Nat. Comput., 9 (4): 819-830 (2010)Spanning subgraphs with applications to communication on a subclass of the Cayley-graph-based networks., and . Discret. Appl. Math., 83 (1-3): 79-96 (1998)Fully homomorphic encryption: a general framework and implementations., and . Int. J. Parallel Emergent Distributed Syst., 35 (5): 493-498 (2020)Finding the maximum subsequence sum on interconnection networks., and . Int. J. Parallel Emergent Distributed Syst., 22 (5): 371-385 (2007)Twentieth Anniversary Issue: Editorial Note.. Parallel Process. Lett., (2011)