Author of the publication

Flat Holonomies on Automata Networks.

, and . STACS, volume 3884 of Lecture Notes in Computer Science, page 23-49. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 151-168. Springer, (2003)Intrusion-Resilient Secure Channels., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 238-253. (2005)Broadcasting on a budget in the multi-service communication model., , and . HiPC, page 163-170. IEEE Computer Society, (1998)On Mixed Connectivity Certificates (Extended Abstract)., , and . ESA, volume 979 of Lecture Notes in Computer Science, page 1-16. Springer, (1995)On Mixed Connectivity Certificates., , and . Theor. Comput. Sci., 203 (2): 253-269 (1998)Cryptographic tamper evidence.. ACM Conference on Computer and Communications Security, page 355-364. ACM, (2003)Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions.. SCN, volume 2576 of Lecture Notes in Computer Science, page 102-118. Springer, (2002)Flat Holonomies on Automata Networks., and . STACS, volume 3884 of Lecture Notes in Computer Science, page 23-49. Springer, (2006)Flat Holonomies on Automata Networks, and . CoRR, (2005)Securing bulk content almost for free., , , , and . Comput. Commun., 29 (3): 280-290 (2006)