Author of the publication

A tree-covering problem arising in integrity of tree-structured data.

, , and . Inf. Process. Lett., 109 (1): 79-82 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote Revocation of Smart Cards in a Private DRM System., , and . ACSW, volume 44 of CRPIT, page 169-178. Australian Computer Society, (2005)Efficient Leakage-free Authentication of Trees, Graphs and Forests., , and . IACR Cryptology ePrint Archive, (2012)On Symmetry Detection.. IEEE Trans. Computers, 34 (7): 663-666 (1985)Dynamic and Efficient Key Management for Access Hierarchies., , , and . ACM Trans. Inf. Syst. Secur., 12 (3): 18:1-18:43 (2009)Parallel Algorithms for Evaluating Sequences of Set-Manipulation Operations., , and . J. ACM, 41 (6): 1049-1088 (1994)Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS., , , and . Cloud-I, page 9. ACM, (2012)Key management for non-tree access hierarchies., , and . SACMAT, page 11-18. ACM, (2006)Leakage-free redactable signatures., , and . CODASPY, page 307-316. ACM, (2012)Efficient Parallel Algorithms for Planar st-Graphs.. ISAAC, volume 1350 of Lecture Notes in Computer Science, page 223-232. Springer, (1997)Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric., , , and . WADS, volume 4619 of Lecture Notes in Computer Science, page 114-126. Springer, (2007)