Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking and Repairing an Approximate Message Authentication Scheme., , and . Discret. Math. Algorithms Appl., 3 (3): 393-412 (2011)Performance Analysis of Linux RNG in Virtualized Environments., , and . CCSW, page 29-39. ACM, (2015)Verifiable local computation on distributed data., , and . SCC@ASIACCS, page 3-10. ACM, (2014)K2SN-MSS: An Efficient Post-Quantum Signature., and . AsiaCCS, page 501-514. ACM, (2019)Non-interactive conference key distribution and its applications., and . AsiaCCS, page 271-282. ACM, (2008)New constructions for multicast re-keying schemes using perfect hash families., and . ACM Conference on Computer and Communications Security, page 228-234. ACM, (2000)Traceable policy-based signatures and instantiation from lattices., , , and . Inf. Sci., (2022)Digital Rights Management for Content Distribution., , and . ACSW, volume 21 of CRPIT, page 49-58. Australian Computer Society, (2003)Towards a Resilient Smart Home., , , , , and . IoT S&P@SIGCOMM, page 15-21. ACM, (2018)Directional Distance-Bounding Identification., and . ICISSP (Revised Selected Papers), volume 867 of Communications in Computer and Information Science, page 197-221. Springer, (2017)