Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic Analysis of Balancedness in Symmetric Cryptography., and . ISCIS, volume 4263 of Lecture Notes in Computer Science, page 1011-1020. Springer, (2006)Secure ambient intelligence prototype for airports., , , , and . CoRR, (2022)Fuzzy-based forest fire prevention and detection by wireless sensor networks., , , , , and . CoRR, (2022)Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks., , and . WOSIS, page 103-110. INSTICC Press, (2009)Algorithm for Proving the Knowledge of an Independent Vertex Set., and . EUROCAST, volume 3643 of Lecture Notes in Computer Science, page 346-354. Springer, (2005)Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)., , , and . CompSysTech, page 56. ACM, (2009)The teaching of cryptologic mathematics., , and . CompSysTech, page 580-584. ACM, (2003)Research on smart-locks cybersecurity and vulnerabilities., , , and . Wirel. Networks, 30 (6): 5905-5917 (August 2024)FastTriaje: A Mobile System for Victim Classification in Emergency Situations., , , and . WEBIST (1), page 238-242. SciTePress, (2014)Differentiated Services to Provide Efficient Node Authentication in VANETs., , and . Security and Management, page 184-187. CSREA Press, (2009)