Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and scalable many-to-one symbol transmission for sensor networks., , and . Comput. Commun., 31 (10): 2408-2413 (2008)Collusion-secure and cost-effective detection of unlawful multimedia redistribution., and . IEEE Trans. Syst. Man Cybern. Part C, 33 (3): 382-389 (2003)Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks., , , and . IEEE Trans. Veh. Technol., 58 (4): 1876-1886 (2009)Iterated endorsement deduction and ranking., and . Computing, 99 (5): 431-446 (2017)Efficient multivariate data-oriented microaggregation., , , and . VLDB J., 15 (4): 355-369 (2006)Asynchronous Large-Scale Certification Based on Certificate Verification Trees., , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)A Privacy-Preserving Pay-by-Phone Parking System., , and . IEEE Trans. Vehicular Technology, 66 (7): 5697-5706 (2017)MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services., , and . CARDIS, page 125-134. USENIX, (2002)Synthetic Generation of Social Network Data With Endorsements., and . CoRR, (2014)Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 185-198. Springer, (2007)