Author of the publication

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.

, , , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 37-54. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-term Path Prediction in Urban Scenarios using Circular Distributions, , , , , and . Image and Vision Computing, (January 2018)CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices., , , , , and . ACM Trans. Cyber Phys. Syst., 4 (3): 34:1-34:19 (2020)Special issue on advances in security and privacy in IoT., , and . J. Netw. Comput. Appl., (2019)Stackelberg games for modeling defense scenarios against cloud security threats., , and . J. Netw. Comput. Appl., (2018)Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources., , , , and . Math. Comput. Model., 58 (5-6): 1389-1404 (2013)Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems., and . Future Gener. Comput. Syst., (2020)Improving the gossiping effectiveness with distributed strategic learning (Invited paper)., , , and . Future Gener. Comput. Syst., (2017)MPLS DiffServ-Enabled Traffic Engineering: A Scalable QoS Model for Optical-Speed Media Streaming Networks.. HSNMC, volume 3079 of Lecture Notes in Computer Science, page 301-313. Springer, (2004)Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam., and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 610-619. Springer, (2005)A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure., , and . OPODIS, volume 6490 of Lecture Notes in Computer Science, page 159-172. Springer, (2010)