Author of the publication

A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking.

, , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 216-228. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distribution of Offensive Material Over Computer Networks: A Research Agenda., , , and . ECIW, page 355-362. Academic Conferences Limited, Reading, UK, (2005)A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code., and . ISSA, page 1-18. ISSA, Pretoria, South Africa, (2008)Η συμβολή οργανωσιακών εικόνων ασφαλείας πληροφοριακού συστήματος στην υλοποίηση ασφαλών πληροφοριακών συστημάτων. Athens University Economics and Business, Greece, (2003)National Archive of PhD Theses: oai:10442/13649.Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination., , , , and . WDFIA, page 55-68. Plymouth University, UK, (2011)A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking., , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 216-228. Springer, (2010)Hard-drive Disposal and Identity Fraud., and . SEC, volume 232 of IFIP, page 461-466. Springer, (2007)System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis., , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 309-321. Springer, (2017)A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks., , , , and . SECURWARE, page 193-202. IEEE Computer Society, (2008)Perceptions of Security Contributing to the Implementation of Secure IS., and . SEC, volume 250 of IFIP Conference Proceedings, page 313-324. Kluwer, (2003)A lightweight web-based vulnerability scanner for small-scale computer network security assessment., and . J. Netw. Comput. Appl., 32 (1): 78-95 (2009)