Author of the publication

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks.

, , and . COMPSAC (1), page 271-279. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple and Flexible Revocation Checking with Privacy., and . Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, page 351-367. Springer, (2006)Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks., , and . COMPSAC (1), page 271-279. IEEE Computer Society, (2009)A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem., and . IEEE Symposium on Security and Privacy Workshops, page 1-11. IEEE Computer Society, (2012)Loud and Clear: Human-Verifiable Authentication Based on Audio., , , , and . IACR Cryptology ePrint Archive, (2005)Privacy-preserving revocation checking., , and . Int. J. Inf. Sec., 8 (1): 61-75 (2009)Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs)., , and . ACM Conference on Computer and Communications Security, page 825-828. ACM, (2011)Private Searching for Sensitive File Signatures.. SECRYPT, page 341-344. SciTePress, (2011)Using audio in secure device pairing., , , , , and . Int. J. Secur. Networks, 4 (1/2): 57-68 (2009)Simple and Flexible Private Revocation Checking., and . IACR Cryptology ePrint Archive, (2006)On Source Code Transformations for Steganographic Applications., and . Web Intelligence/IAT Workshops, page 261-264. IEEE Computer Society, (2011)978-0-7695-4513-4.