Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication.. ACM Conference on Computer and Communications Security, page 93-100. ACM, (1999)Securing information flows: A metadata framework., , , and . MASS, page 748-753. IEEE Computer Society, (2008)Policy Evolution with Grammatical Evolution., , , and . SEAL, volume 5361 of Lecture Notes in Computer Science, page 71-80. Springer, (2008)Towards Sound Approaches to Counteract Power-Analysis Attacks., , , and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 398-412. Springer, (1999)Trojan Detection using IC Fingerprinting., , , , and . S&P, page 296-310. IEEE Computer Society, (2007)Relativization: a Revisionistic Retrospective., , , , and . Current Trends in Theoretical Computer Science, volume 40 of World Scientific Series in Computer Science, World Scientific, (1993)MLS security policy evolution with genetic programming., , , and . GECCO, page 1571-1578. ACM, (2008)Improved algorithms via approximations of probability distributions (extended abstract)., , and . STOC, page 584-592. ACM, (1994)Policy evolution with Genetic Programming: A comparison of three approaches., , , and . IEEE Congress on Evolutionary Computation, page 1792-1800. IEEE, (2008)An IPSec-based Host Architecture for Secure Internet Multicast., , , , , , and . NDSS, The Internet Society, (2000)