Author of the publication

Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.

, , , , and . International Conference on Wireless Networks, page 202-209. CSREA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evidence for the Direct Two-Photon Transition from \$\psi'\$ to \$J/\psi\$, , , , , , , , , and 348 other author(s). (Apr 1, 2012)Measurements of the absolute branching fractions for \$D\_s^+\rightarrowe^+\nu\_e\$ and \$D\_s^+\rightarrow\eta^\prime e^+\nu\_e\$, , , , , , , , , and 415 other author(s). (Aug 23, 2016)Measurement of $e^+ e^- K^+ K^-$ cross section at $s = 2.00 - 3.08$ GeV, , , , , , , , , and 450 other author(s). (2018)cite arxiv:1811.08742Comment: 8 figures.Measurement of the \$D\_s^+ \ell^+\nu\_\ell\$ branching fractions and the decay constant \$f\_D\_s^+\$, , , , , , , , , and 408 other author(s). (Aug 24, 2016)Applying Forward Security and Threshold Cryptography in Ad Hoc Networks., , , , and . International Conference on Wireless Networks, page 202-209. CSREA Press, (2004)Diversity-induced weighted classifier ensemble learning., , , , and . ICIP, page 1232-1236. IEEE, (2017)Polycyclic aromatic hydrocarbon size distributions in aerosols from appliances of residential wood combustion as determined by direct thermal desorption - GC/MS, , , , and . Journal of Aerosol Science, 34 (8): 1061--1084 (August 2003)Spectroscopic Investigation of the Effect of Microstructure and Energetic Offset on the Nature of Interfacial Charge Transfer States in Polymer: Fullerene Blends, , , , , , , , , and 1 other author(s). Journal of the American Chemical Society, (March 2019)Modelling of real systems based on measuring results., , and . ICASSP, page 3373-3376. IEEE Computer Society, (1991)Secure Chained Threshold Proxy Signature without and with Supervision., , , , and . J. Softw. Eng. Appl., 2 (4): 267-275 (2009)