Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TNFS resistant families of pairing-friendly elliptic curves., and . Theor. Comput. Sci., (2019)Efficient Certification Path Discovery for MANET., , , , and . EURASIP J. Wireless Comm. and Networking, (2010)Some remarks on the construction of class polynomials., and . Adv. Math. Commun., 5 (1): 109-118 (2011)Binary tree based public-key management for Mobile Ad Hoc Networks., , and . ISWCS, page 687-692. IEEE, (2008)"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience., , , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 44-58. Springer, (2005)On the Construction of Prime Order Elliptic Curves., , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 309-322. Springer, (2003)Efficient cluster-based group key agreement protocols for wireless ad hoc networks.. J. Netw. Comput. Appl., 34 (1): 384-393 (2011)A framework for identity privacy in SIP., , , and . J. Netw. Comput. Appl., 33 (1): 16-28 (2010)What is your "birthday elliptic curve"?, , , and . Finite Fields Their Appl., 18 (6): 1232-1241 (2012)On the Efficient Generation of Prime-Order Elliptic Curves., , , and . J. Cryptol., 23 (3): 477-503 (2010)