Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Structure and Computation of Random Walk Times in Finite Graphs., , , and . IEEE Trans. Autom. Control., 64 (11): 4470-4483 (2019)Unconditionally Secure Authenticated Encryption with Shorter Keys., and . WOSIS, page 5-15. INSTICC Press, (2009)On the Structure and Computation of Random Walk Times in Finite Graphs., , , and . CoRR, (2017)Efficient Authentication for Mobile and Pervasive Computing., and . IEEE Trans. Mob. Comput., 13 (3): 469-481 (2014)Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games., , , , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 113-129. Springer, (2015)Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification., , , and . IEEE Trans. Parallel Distributed Syst., 23 (8): 1536-1550 (2012)Scalable RFID systems: a privacy-preserving protocol with constant-time identification., , , and . DSN, page 1-10. IEEE Computer Society, (2010)A host takeover game model for competing malware., , , , and . CDC, page 4523-4530. IEEE, (2015)On Secure NOMA Systems With Transmit Antenna Selection Schemes., , , , , , , and . IEEE Access, (2017)Secret Key Agreement: Fundamental Limits and Practical Challenges., , , and . IEEE Wirel. Commun., 24 (3): 72-79 (2017)