Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol., and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 302-311. Springer, (2006)An efficient locking and unlocking method of sequential systems., , , and . RACS, page 428-433. ACM, (2012)Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks.. SVCC, page 1-3. IEEE, (2024)Scheduling of Real-Time Tasks with Complex Constraints., and . Performance Evaluation, volume 1769 of Lecture Notes in Computer Science, page 253-282. Springer, (2000)Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks., , , and . Secur. Commun. Networks, 8 (7): 1169-1178 (2015)Designing a two-level monitoring method to detect network abnormal behaviors., , and . IRI, page 703-709. IEEE Computer Society, (2014)FSM watermarks based on ordering of flip flops., , and . RACS, page 258-262. ACM, (2014)A unified design method utilizing decomposability and composability for secure systems., , , and . RACS, page 272-276. ACM, (2011)End-to-End Optimization in Heterogeneous Distributed Real-Time Systems.. LCTES, volume 1474 of Lecture Notes in Computer Science, page 235-249. Springer, (1998)Power Surge and Clock Hiccup Side-Channel Watermarking Approach for Finite State Machines., and . CCWC, page 922-928. IEEE, (2019)