Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complete Redundancy Detection in Firewalls., and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 193-206. Springer, (2005)Structured firewall design., and . Comput. Networks, 51 (4): 1106-1120 (2007)A secure cookie scheme., , and . Comput. Networks, 56 (6): 1723-1730 (2012)Reliable bursty convergecast in wireless sensor networks., , , and . Comput. Commun., 30 (13): 2560-2576 (2007)Secure group communications using key graphs., , and . IEEE/ACM Trans. Netw., 8 (1): 16-30 (2000)Hop Integrity in the Internet, and . Advances in Information Security Springer, (2006)Stabilizing Communication Protocols., and . IEEE Trans. Computers, 40 (4): 448-458 (1991)Adaptive Programming., and . IEEE Trans. Software Eng., 17 (9): 911-921 (1991)Securing NFC Credit Card Payments Against Malicious Retailers., , and . NETYS, volume 9944 of Lecture Notes in Computer Science, page 214-228. Springer, (2016)The K-Observer Problem in Computer Networks., , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 5-18. Springer, (2011)