Author of the publication

Distributed Group Key Management for Event Notification Confidentiality Among Sensors.

, , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 566-580 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace.. Int. J. Netw. Secur., 6 (1): 6-14 (2008)Guest Editorial: Soft Computing Applications for Novel and Upcoming Distributed and Parallel Systems From Cloud Computing and Beyond., , , and . IEEE Trans. Ind. Informatics, 15 (10): 5646-5647 (2019)A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners., , , and . Comput., 13 (2): 43 (2024)Self-association in multilayer linear networks with limited connectivity., and . Neural Networks, 11 (4): 601-609 (1998)Long-term Path Prediction in Urban Scenarios using Circular Distributions, , , , , and . Image and Vision Computing, (January 2018)MPLS DiffServ-Enabled Traffic Engineering: A Scalable QoS Model for Optical-Speed Media Streaming Networks.. HSNMC, volume 3079 of Lecture Notes in Computer Science, page 301-313. Springer, (2004)Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam., and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 610-619. Springer, (2005)A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure., , and . OPODIS, volume 6490 of Lecture Notes in Computer Science, page 159-172. Springer, (2010)Dealing with Reliable Event-Based Communications by Means of Layered Multicast., , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 572-581. Springer, (2015)Special issue on advances in security and privacy in IoT., , and . J. Netw. Comput. Appl., (2019)