Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-phase Nonrepudiation Protocols., , and . ICCCNT, page 22:1-22:8. ACM, (2016)The Implication Problem of Computing Policies., , , , and . SSS, volume 9212 of Lecture Notes in Computer Science, page 109-123. Springer, (2015)Nonrepudiation Protocols Without a Trusted Party., , and . NETYS, volume 9944 of Lecture Notes in Computer Science, page 1-15. Springer, (2016)Nonrepudiation Protocols in Cloud Systems., and . ICCCNT, page 23:1-23:6. ACM, (2016)HAC-T and Fast Search for Similarity in Security., , and . COINS, page 1-7. IEEE, (2020)Scalable Malware Clustering using Multi-Stage Tree Parallelization., , and . ISI, page 1-6. IEEE, (2020)An Evaluation of Malware Triage Similarity Hashes., , , and . ICEIS (1), page 431-435. SCITEPRESS, (2023)