From post

A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution.

, , , и . ICGS3/e-Democracy, том 99 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 72-79. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Undecidability of the Panopticon Detection Problem., , , и . CSCML, том 13301 из Lecture Notes in Computer Science, стр. 78-87. Springer, (2022)Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)., , и . CSCML, том 11527 из Lecture Notes in Computer Science, стр. 324-327. Springer, (2019)Exploring Trade-Offs in Partial Snapshot Implementations., , , и . SSS, том 14310 из Lecture Notes in Computer Science, стр. 90-105. Springer, (2023)Ασφαλή και έμπιστα πρωτόκολλα επικοινωνιών με χρήση κρυπτογραφίας και κρυπτανάλυσης. University of Patras, Greece, (2008)National Archive of PhD Theses: oai:10442/17286.On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents., , , и . CSCML, том 13914 из Lecture Notes in Computer Science, стр. 501-510. Springer, (2023)Electronic National Lotteries., , , , и . Financial Cryptography, том 3110 из Lecture Notes in Computer Science, стр. 147-163. Springer, (2004)A Trustworthy and Privacy Preserving Model for Online Competence Evaluation System., и . DepCoS-RELCOMEX, том 761 из Advances in Intelligent Systems and Computing, стр. 338-347. Springer, (2018)How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem., , , и . Cryptogr., 6 (3): 42 (2022)Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?, , и . e-Democracy, том 26 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 199-208. Springer, (2009)Security and Privacy Vulnerabilities in Human Activity Recognition systems., , и . SEEDA-CECNSM, стр. 1-6. IEEE, (2022)