Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topographic Profile Retrieval using the Interference Pattern GNSS-R Technique., , , , , , , , , and 3 other author(s). IGARSS (3), page 420-423. IEEE, (2009)Initial Results of a Digital Radiometer with Digital Beamforming., , , , , , , and . IGARSS (2), page 485-488. IEEE, (2008)Soil Moisture Retrieval Using GNSS-R Techniques: Measurement Campaign in a Wheat Field., , , , , , and . IGARSS (2), page 245-248. IEEE, (2008)Digital Beamforming Analysis and Performance for a Digital L-band Pseudo-correlation Radiometer., , , , , , , and . IGARSS (5), page 184-187. IEEE, (2009)Verifier-Key-Flexible Universal Designated-Verifier Signatures., , , , and . IMACC, volume 4887 of Lecture Notes in Computer Science, page 403-421. Springer, (2007)Automated Proofs for Computational Indistinguishability., , and . Comput. J., 57 (10): 1513-1536 (2014)Modelling denial of service attacks on JFK with Meadows's cost-based framework., , and . ACSW, volume 54 of CRPIT, page 125-134. Australian Computer Society, (2006)Improving the Efficiency of RFID Authentication with Pre-Computation., , and . AISC, volume 125 of CRPIT, page 91-100. Australian Computer Society, (2012)Automating Computational Proofs for Public-Key-Based Key Exchange., , and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 53-69. Springer, (2010)Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 166-179. Springer, (2003)