Author of the publication

Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols.

, , , , and . HICSS, page 1-10. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 260-281. Springer, (2006)DLPKH - Distributed Logical Public-Key Hierarchy., and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 110-127. Springer, (2007)Review and Revocation of Access Privileges Distributed with PKI Certificates., and . Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, page 100-112. Springer, (2000)Towards A Taxonomy Of Attacks Against Energy Control Systems., , and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 71-85. Springer, (2008)Mithril: Adaptable Security for Survivability in Collaborative Computing Sites., , , , , , , and . SecureComm, page 1-7. IEEE, (2006)Time Valid One-Time Signature for Time-Critical Multicast Data Authentication., , , and . INFOCOM, page 1233-1241. IEEE, (2009)Operational Security Requirements for Large Collaborative Compute Infrastructures., , , and . CollaborateCom, IEEE Computer Society / ICST, (2006)Reasoning about Joint Administration of Access Policies for Coalition Resources., , and . ICDCS, page 429-438. IEEE Computer Society, (2002)Administering Access Control in Dynamic Coalitions., , , , and . LISA, page 249-261. USENIX, (2005)Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems., , and . eScience, page 431-439. IEEE Computer Society, (2007)