Author of the publication

Authorisation Subterfuge by Delegation in Decentralised Networks.

, and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 97-102. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of Liquid Ingress in GFRP Honeycomb Based on One-Dimension Sequential Model Using THz-TDS., , , and . Sensors, 23 (3): 1149 (February 2023)METTS: Multilingual Emotional Text-to-Speech by Cross-Speaker and Cross-Lingual Emotion Transfer., , , , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2024)DetZero: Rethinking Offboard 3D Object Detection with Long-term Sequential Point Clouds., , , , , , , , , and 2 other author(s). ICCV, page 6713-6724. IEEE, (2023)A Logic for Analysing Subterfuge in Delegation Chains., and . Formal Aspects in Security and Trust, volume 3866 of Lecture Notes in Computer Science, page 127-141. Springer, (2005)Optimal dispatch of electric taxis and price making of charging stations using Stackelberg game., , , and . IECON, page 4929-4934. IEEE, (2015)Defect Depth Determination in Laser Infrared Thermography Based on LSTM-RNN., , , , , , and . IEEE Access, (2020)Improving Cross-Lingual Speech Synthesis with Triplet Training Scheme., , , , , , and . ICASSP, page 6072-6076. IEEE, (2022)Salt: Distinguishable Speaker Anonymization Through Latent Space Transformation., , , , , and . ASRU, page 1-8. IEEE, (2023)Authorisation Subterfuge by Delegation in Decentralised Networks., and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 97-102. Springer, (2005)A collaborative approach to autonomic security protocols., and . NSPW, page 13-21. ACM, (2004)