Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TWOPRIME: A Fast Stream Ciphering Algorithm., , , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 88-102. Springer, (1997)Maximal Dense Intervals of Grammar Forms.. ICALP, volume 317 of Lecture Notes in Computer Science, page 424-438. Springer, (1988)Issues with Applying Cryptography in Wireless Systems.. Theory Is Forever, volume 3113 of Lecture Notes in Computer Science, page 205-215. Springer, (2004)Parental Control with Edge Computing and 5G Networks., , and . FRUCT, page 290-300. IEEE, (2021)Distributed Usage Control., , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 562-569. Elsevier, (2011)A Research Model for Trustworthy Pervasive Social Networking., , , and . TrustCom/ISPA/IUCC, page 1522-1527. IEEE Computer Society, (2013)Exploring Trust of Mobile Applications Based on User Behaviors., , , and . INTRUST, volume 6163 of Lecture Notes in Computer Science, page 212-226. Springer, (2009)Evaluating the performance and privacy of a token-based collaborative recommender., and . WI, page 1049-1053. ACM, (2017)Secure Vickrey Auctions without Threshold Trust., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 87-101. Springer, (2002)Privacy preserving 2-party queries on bipartite graphs with private set intersection., , and . SAC, page 1867-1870. ACM, (2019)