Author of the publication

Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.

, , , , , and . IEEE Netw., 21 (4): 51-56 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Application Layer Emulation in Industrial Control System Honeypots., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 83-98. (2016)Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 24-30. Springer, (2014)Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information., , , and . WISTP, volume 5019 of Lecture Notes in Computer Science, page 36-48. Springer, (2008)A secure group communication architecture for autonomous unmanned aerial vehicles., , , and . Secur. Commun. Networks, 2 (1): 55-69 (2009)Enhancing realistic hands-on network training in a virtual environment., , , and . SpringSim, SCS/ACM, (2009)Towards a Taxonomy of Wired and Wireless Anonymous Networks., , , , and . ICC, page 1-8. IEEE, (2009)Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation., , , and . SERVICES, page 156-157. IEEE Computer Society, (2010)The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology., , , , and . HICSS, page 271. IEEE Computer Society, (2007)SDN shim: Controlling legacy devices., and . LCN, page 169-172. IEEE Computer Society, (2015)Alert Verification Evasion Through Server Response Forging., , , , and . RAID, volume 4637 of Lecture Notes in Computer Science, page 256-275. Springer, (2007)