Author of the publication

Accelerating Key Establishment Protocols for Mobile Communication.

, , , and . ACISP, volume 1587 of Lecture Notes in Computer Science, page 51-63. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient merging algorithm for recovery and garbage collection in incremental checkpointing., , , , and . Parallel and Distributed Computing and Networks, page 358-368. IASTED/ACTA Press, (2004)Efficient parallel exponentiation in GF(qn) using normal basis representations., , , and . J. Algorithms, 54 (2): 205-221 (2005)A Low-Overhead, High-Performance Unified Buffer Management Scheme That Exploits Sequential and Looping References., , , , , , and . OSDI, page 119-134. USENIX Association, (2000)Adaptive link recovery scheme for structured peer-to-peer networks under churn., , , and . SAC, page 611-615. ACM, (2011)An efficient Hadoop data replication method design for heterogeneous clusters., , , and . SAC, page 2182-2184. ACM, (2016)Adaptive page-level incremental checkpointing based on expected recovery time., , , and . SAC, page 1472-1476. ACM, (2006)Feasibility analysis of hard real-time periodic tasks., and . J. Syst. Softw., (2004)Deleting keys of B-trees in parallel., , and . J. Parallel Distributed Comput., 64 (9): 1041-1050 (2004)ASTRAL: an adaptive, efficient, and reliable flooding mechanism for MANET., , , and . SAC, page 731-732. ACM, (2010)Chordet: an efficient and transparent replication for improving availability of peer-to-peer networked systems., , , , and . SAC, page 221-225. ACM, (2010)