Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stack and Queue Layouts for Toruses and Extended Hypercubes., , , and . HICSS, page 1-10. IEEE Computer Society, (2010)On Sorting by Prefix Reversals and the Diameter of Pancake Networks., and . Heinz Nixdorf Symposium, volume 678 of Lecture Notes in Computer Science, page 218-227. Springer, (1992)Improved Techniques for MCM Layer Assignment., , and . ICCD, page 604-607. IEEE Computer Society, (1994)On the Diameter of the Pancake Network., and . J. Algorithms, 25 (1): 67-94 (1997)Towards Trusted Online Dissemination of Consumer Information., , , and . HICSS, IEEE Computer Society, (2004)Combinatorial Optimization of Multicast Key Management., , , and . HICSS, page 332. IEEE Computer Society, (2003)IoT security attacks using reverse engineering methods on WSN applications., , and . WF-IoT, page 182-187. IEEE Computer Society, (2016)Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast., , and . HICSS, IEEE Computer Society, (2006)An Intrusion-Tolerant Password Authentication System., , and . ACSAC, page 110-118. IEEE Computer Society, (2003)Computing Cross Associations for Attack Graphs and Other Applications., , , and . HICSS, page 270. IEEE Computer Society, (2007)