Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consensus-based distributed intrusion detection for multi-robot systems., , , , and . ICRA, page 120-127. IEEE, (2008)Scalable and Secure Group Rekeying in Wireless Sensor Networks., and . Parallel and Distributed Computing and Networks, page 84-88. IASTED/ACTA Press, (2006)An Overview of VOAC, a Virtual Organizations Access Control Infrastructure., and . Parallel and Distributed Computing and Networks, page 29-34. IASTED/ACTA Press, (2006)Improving authentication of remote card transactions with mobile personal trusted devices., and . Comput. Commun., 30 (8): 1697-1712 (2007)Protected pointers in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 24 (3): 204-212 (2017)Decentralized intrusion detection for secure cooperative multi-agent systems., , , , and . CDC, page 1553-1558. IEEE, (2007)Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates., , , and . ISCC, page 1-6. IEEE, (2021)A Low-Cost UAV-Based Secure Location Verification Method., , and . ARES, page 30:1-30:6. ACM, (2017)A cryptographic suite for underwater cooperative applications., and . ISCC, page 870-875. IEEE Computer Society, (2011)Performance and Security Evaluation of SDN Networks in OMNeT++/INET., , and . CoRR, (2016)