Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ubiquitous Authorization Scheme Based on Device Profile., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 312-321. Springer, (2006)An Improved Forward Integrity Protocol for Mobile Agents., , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 272-285. Springer, (2003)Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy., , and . AISC, volume 161 of CRPIT, page 67-70. Australian Computer Society, (2015)Linkability in Practical Electronic Cash Design., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)Towards Secure and Legal E-Tendering., , , , , , , and . J. Inf. Technol. Constr., (2006)Analysis of two authorization protocols using Colored Petri Nets., , , and . Int. J. Inf. Sec., 14 (3): 221-247 (2015)Denial-of-service resistance in key establishment., , , , and . Int. J. Wirel. Mob. Comput., 2 (1): 59-71 (2007)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)An Implementation of the Yao Forward Integrity Protocol for Mobile Agents., , and . Cryptographic Algorithms and their Uses, page 110-124. Queensland University of Technology, (2004)Machine Learning to Optimize TCP Communications Over High Frequency Communications Links., , , and . IEEE Access, (2022)