Author of the publication

Malicious Clients in Distributed Secret Sharing Based Storage Networks.

, , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Management of Quantum Generated Keys in IPsec., , , , , , and . SECRYPT, page 177-183. INSTICC Press, (2008)Towards a Performance Model for Byzantine Fault Tolerant Services., , and . CLOSER, page 178-189. SCITEPRESS, (2022)The Archistar Secret-Sharing Backup Proxy., , and . ARES, page 88:1-88:8. ACM, (2017)Malicious Clients in Distributed Secret Sharing Based Storage Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)A fast and resource efficient FPGA implementation of secret sharing for storage applications., , and . DATE, page 654-659. IEEE, (2018)Embedding quantum cryptography on DSP-boards., , , and . EUSIPCO, page 2027-2030. IEEE, (2004)Cloud Security and Privacy by Design., , and . e-Democracy, volume 570 of Communications in Computer and Information Science, page 202-206. Springer, (2015)Passive ROADM Flexibility in Optical Access With Spectral and Spatial Reconfigurability., , , , , , , , and . IEEE J. Sel. Areas Commun., 33 (12): 2837-2846 (2015)A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management., , and . CCSW, page 41-51. ACM, (2022)A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing., , and . ICISSP, page 637-647. SCITEPRESS, (2022)