Author of the publication

ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication.

, and . ICN/ICONS/MCL, page 75. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAP estimation of finite gray-scale digital images corrupted by supremum/infimum noise., and . IEEE Trans. Image Processing, 6 (8): 1077-1088 (1997)Low rate video frame interpolation - challenges and solution., , and . ICASSP (3), page 117-120. IEEE, (2003)Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks., , and . Int. J. Netw. Secur., 17 (5): 535-547 (2015)Performance of JPEG Image Transmission Using Proposed Asymmetric Turbo Code., , and . EURASIP J. Adv. Signal Process., (2007)ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication., and . ICN/ICONS/MCL, page 75. IEEE Computer Society, (2006)Related-Mode Attacks on Block Cipher Modes of Operation., and . ICCSA (3), volume 3482 of Lecture Notes in Computer Science, page 661-671. Springer, (2005)Implementation of a Time-Out Based Locking Algorithm for Mobile Transactions in XML Databases., and . iiWAS, volume 183 of books@ocg.at, Austrian Computer Society, (2004)Cryptanalysis of PASS II and MiniPass., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 159-168. Springer, (2005)Multivariate polynomial products over modular rings using residue arithmetic., and . IEEE Trans. Signal Process., 43 (5): 1310-1312 (1995)A Framework for Describing Block Cipher Cryptanalysis., and . IEEE Trans. Computers, 55 (11): 1402-1409 (2006)