Author of the publication

Comparative study of multicast authentication schemes with application to wide-area measurement system.

, , , , and . AsiaCCS, page 287-298. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improving Algorithm for Combined Input-Crosspoint-Queued Switches., , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 281-287. Springer, (2014)A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model., , and . Information, 6 (4): 576-591 (2015)A CMOS Time-Resolved Fluorescence Lifetime Analysis Micro-System., , , , , , , , and . Sensors, 9 (11): 9255-9274 (2009)A fault tolerant control for modular multilevel converter under submodule fault conditions., , , , and . IECON, page 3155-3160. IEEE, (2017)Semantic Probabilistic Traversable Map Generation For Robot Path Planning., , , , , and . ROBIO, page 2576-2582. IEEE, (2019)What the Past Tells About the Future: Historical Prices in the Durable Goods Market., , and . Manag. Sci., 68 (12): 8857-8871 (December 2022)Predicting Thermodynamic Properties of Alkanes by High-Throughput Force Field Simulation and Machine Learning., , , and . J. Chem. Inf. Model., 58 (12): 2502-2516 (2018)A synthetic indifferentiability analysis of some block-cipher-based hash functions., , and . Des. Codes Cryptogr., 48 (3): 293-305 (2008)WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations., , , , and . IEEE Trans. Computers, 71 (12): 3375-3388 (2022)Physically based animation of sandstorm., , , , and . Comput. Animat. Virtual Worlds, 18 (4-5): 259-269 (2007)