Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecLEACH - On the security of clustered sensor networks., , , , , , and . Signal Process., 87 (12): 2882-2895 (2007)A custom instruction approach for hardware and software implementations of finite field arithmetic over F263 using Gaussian normal bases., , , and . FPT, page 5-12. IEEE, (2005)E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation., and . Appl. Algebra Eng. Commun. Comput., 24 (3-4): 277-308 (2013)FORTUNA - A framework for the design and development of hardware-based secure systems., , and . J. Syst. Softw., 86 (8): 2063-2076 (2013)ACBuilder: A tool for hardware architecture security evaluation., , , , and . HOST, page 97-102. IEEE Computer Society, (2016)An Attack on a Protocol for Certified Delivery., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 428-436. Springer, (2002)Two Notes on the Security of Certificateless Signatures., and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 85-102. Springer, (2007)Connecting the dots: Toward accountable machine-learning printer attribution methods., , , and . J. Vis. Commun. Image Represent., (2018)TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks., , , , , , and . Comput. Commun., 34 (3): 485-493 (2011)Isogeny formulas for Jacobi intersection and twisted hessian curves., , and . Adv. Math. Commun., 14 (3): 507-523 (2020)