Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Secure and Legal E-Tendering., , , , , , , and . J. Inf. Technol. Constr., (2006)An Improved Forward Integrity Protocol for Mobile Agents., , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 272-285. Springer, (2003)Linkability in Practical Electronic Cash Design., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy., , and . AISC, volume 161 of CRPIT, page 67-70. Australian Computer Society, (2015)Ubiquitous Authorization Scheme Based on Device Profile., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 312-321. Springer, (2006)An Implementation of the Yao Forward Integrity Protocol for Mobile Agents., , and . Cryptographic Algorithms and their Uses, page 110-124. Queensland University of Technology, (2004)Analysis of two authorization protocols using Colored Petri Nets., , , and . Int. J. Inf. Sec., 14 (3): 221-247 (2015)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)Denial-of-service resistance in key establishment., , , , and . Int. J. Wirel. Mob. Comput., 2 (1): 59-71 (2007)Machine Learning to Optimize TCP Communications Over High Frequency Communications Links., , , and . IEEE Access, (2022)