Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing Topologies for the Evaluation of IPSEC Implementations., , , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 145-154. Springer, (2009)IPR techniques applied to a multimedia environment in the HYPERMEDIA project., , and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 125-133. SPIE, (1999)Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators., , , and . Cryptologia, 25 (3): 213-229 (2001)A light-weight authentication scheme for wireless sensor networks., , and . Ad Hoc Networks, 9 (5): 727-735 (2011)Performance evaluation of highly efficient techniques for software implementation of LFSR., , and . Comput. Electr. Eng., 37 (6): 1222-1231 (2011)Developing an automated planning tool for non-player character behavior., , , , and . CoSECivi, volume 2719 of CEUR Workshop Proceedings, page 69-77. CEUR-WS.org, (2020)An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks., , , and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 332-339. Springer, (2010)Guest Editorial., , , , and . IET Inf. Secur., 10 (5): 223-224 (2016)UAV Attitude Estimation Using Unscented Kalman Filter and TRIAD., , , and . IEEE Trans. Ind. Electron., 59 (11): 4465-4474 (2012)Optimization of autonomous ship maneuvers applying swarm intelligence., , and . SMC, page 2603-2610. IEEE, (2010)