Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Certification Path Discovery for MANET., , , , and . EURASIP J. Wireless Comm. and Networking, (2010)TNFS resistant families of pairing-friendly elliptic curves., and . Theor. Comput. Sci., (2019)Some remarks on the construction of class polynomials., and . Adv. Math. Commun., 5 (1): 109-118 (2011)Binary tree based public-key management for Mobile Ad Hoc Networks., , and . ISWCS, page 687-692. IEEE, (2008)"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience., , , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 44-58. Springer, (2005)On the Construction of Prime Order Elliptic Curves., , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 309-322. Springer, (2003)A Cluster-Based Framework for the Security of Medical Sensor Environments., , , and . TrustBus, volume 5695 of Lecture Notes in Computer Science, page 52-62. Springer, (2009)More Sparse Families of Pairing-Friendly Elliptic Curves., and . CANS, volume 8813 of Lecture Notes in Computer Science, page 384-399. Springer, (2014)On the Efficient Generation of Generalized MNT Elliptic Curves., and . CAI, volume 8080 of Lecture Notes in Computer Science, page 147-159. Springer, (2013)Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks., , , and . WCAN@ICALP, volume 171 of Electronic Notes in Theoretical Computer Science, page 17-31. Elsevier, (2006)