Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid greedy and genetic algorithms for optimization of relational data warehouses., , and . Artificial Intelligence and Applications, page 500-506. IASTED/ACTA Press, (2007)The Digital Signature Scheme MQQ-SIG., , , , , , and . IACR Cryptology ePrint Archive, (2010)On the Importance of the Key Separation Principle for Different Modes of Operation., , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 404-418. Springer, (2008)CryptoCloak protocol and the prototype application., , and . CNS, page 721-722. IEEE, (2015)Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields., , and . IAS, page 314-319. IEEE, (2011)The Meshwork Ledger, its Consensus and Reward Mechanisms., and . COMSNETS, page 290-298. IEEE, (2021)Preventing DDoS with SDN in 5G., , , and . GLOBECOM Workshops, page 1-7. IEEE, (2019)Bypassing Data Execution Prevention on MicrosoftWindows XP SP2., , , and . ARES, page 1222-1226. IEEE Computer Society, (2007)The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure., , and . IIH-MSP, page 1066-1071. IEEE Computer Society, (2009)VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept., , , , and . IECC, page 73-80. ACM, (2020)