Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Agreement in Peer-to-Peer Wireless Networks., , and . Proc. IEEE, 94 (2): 467-478 (2006)Revocation games in ephemeral networks., , , and . ACM Conference on Computer and Communications Security, page 199-210. ACM, (2008)Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes., , , , and . IEEE Trans. Mob. Comput., 9 (6): 810-823 (2010)Scalable Privacy-Preserving Distributed Learning., , , , , , and . Proc. Priv. Enhancing Technol., 2021 (2): 323-347 (2021)Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies., , , , , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 732-753 (2022)Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 548-567. Springer, (2011)Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels., , , , , and . IEEE Trans. Dependable Secur. Comput., 5 (4): 208-223 (2008)Privacy and Integrity Preserving Computations with CRISP., , , and . CoRR, (2020)A new flexible and modular QoS mapping framework based on psychophysics., , and . MMNS, volume 112 of IFIP Conference Proceedings, page 67-80. Chapman & Hall, (1997)Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 5 (5): 463-476 (2006)