Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Pre-Distributions From Graph-Based Block Designs., , and . CoRR, (2015)Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments., , and . J. Ambient Intell. Humaniz. Comput., 9 (5): 1527-1539 (2018)A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things., , , and . J. Netw. Comput. Appl., (2020)A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem., and . ACM SIGOPS Oper. Syst. Rev., 34 (3): 60-68 (2000)A Memory-efficient Group Key Managment for Communicating Things., , and . Q2SWinet, page 29-35. ACM, (2020)Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note)., , and . Euro-Par, volume 1900 of Lecture Notes in Computer Science, page 600-604. Springer, (2000)Towards Reconciling Safety and Security Risk Analysis Processes in Railway Remote Driving., , , and . ICSRS, page 148-154. IEEE, (2021)Single-Path Network Coding Authentication for Software-Defined Named Data Networking., , and . AICCSA, page 1-8. IEEE Computer Society, (2019)Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment., , and . ISCC, page 327-332. IEEE Computer Society, (2002)Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks., , , and . ISCC, page 419-422. IEEE Computer Society, (2012)