Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Generalized Planar Skyline and Convex Hull Range Queries., , , , and . WALCOM, volume 8344 of Lecture Notes in Computer Science, page 34-43. Springer, (2014)Secret Sharing for mNP: Completeness Results., and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 380-390. (2016)WYSWYE: shoulder surfing defense for recognition based graphical passwords., , and . OZCHI, page 285-294. ACM, (2012)Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission., , and . Theor. Comput. Sci., (2013)Reporting and counting maximal points in a query orthogonal rectangle., , , and . J. Discrete Algorithms, (2015)Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains., , and . CoRR, (2022)Perfectly secure message transmission over partially synchronous networks., , and . ICDCN, page 302-306. ACM, (2019)On perfectly secret message transmission in digraphs tolerating dual failures., , , and . ICDCN, page 29:1-29:10. ACM, (2016)Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots., , , and . ARES, page 600-605. IEEE Computer Society, (2009)Generalized Robust Combiners for Oblivious Transfer., , and . ARES, page 510-515. IEEE Computer Society, (2009)