Author of the publication

Assessing Security in Energy-Efficient Sensor Networks.

, , and . SEC, volume 250 of IFIP Conference Proceedings, page 459-463. Kluwer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations., and . Java Card Workshop, volume 2041 of Lecture Notes in Computer Science, page 52-72. Springer, (2000)Basic Proof Skills of Computer Science Students., , and . FPLE, volume 1022 of Lecture Notes in Computer Science, page 269-287. Springer, (1995)An Operational Model of QuickPay - Extended Abstract., , and . CARDIS, volume 1820 of Lecture Notes in Computer Science, page 19-28. Springer, (1998)Performance of Lazy Combinator Graph Reduction.. Softw. Pract. Exp., 21 (3): 299-329 (1991)Privacy-preserving profile matching using the social graph., , and . CASoN, page 42-47. IEEE, (2011)Functional Principles of Registry-based Service Discovery., , , , and . LCN, page 209-217. IEEE Computer Society, (2005)Multimedia QoS in Low-Cost Home Networks., , , , , and . LCN, page 327-328. IEEE Computer Society, (2002)Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow., , and . FMCAD, page 1-10. IEEE, (2008)StreamTo: Streaming Content using a Tamper-Resistant Token., , , , , and . SEC, volume 181 of IFIP, page 601-612. Springer, (2005)Workload-based configuration of MEMS-based storage devices for mobile systems., , and . EMSOFT, page 41-50. ACM, (2008)