Author of the publication

A Pursuer-Evader Game for Sensor Networks.

, , and . Self-Stabilizing Systems, volume 2704 of Lecture Notes in Computer Science, page 1-16. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Necessary and Sufficient Conditions to Detect Message Duplication in Protocol Hierarchies., and . PSTV, page 317. North-Holland, (1982)Using Semiouterjoins to Process Queries in Multidatabase Systems., , and . PODS, page 153-162. ACM, (1984)Sources and Monitors: A Trust Model for Peer-to-Peer Networks., and . ICCCN, page 285-290. IEEE, (2008)HTTPI: An HTTP with Integrity., and . ICCCN, page 1-6. IEEE, (2011)Securing NFC Credit Card Payments Against Malicious Retailers., , and . NETYS, volume 9944 of Lecture Notes in Computer Science, page 214-228. Springer, (2016)Load Balancing: An Exercise in Constrainted Convergence., and . WDAG, volume 972 of Lecture Notes in Computer Science, page 183-197. Springer, (1995)The K-Observer Problem in Computer Networks., , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 5-18. Springer, (2011)A secure credit card protocol over NFC., , and . ICDCN, page 32:1-32:9. ACM, (2016)A Technique for Proving Liveness of Communicating Finite State Machines with Examples., and . PODC, page 38-49. ACM, (1984)Batch rekeying for secure group communications., , , and . WWW, page 525-534. ACM, (2001)