Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid greedy and genetic algorithms for optimization of relational data warehouses., , and . Artificial Intelligence and Applications, page 500-506. IASTED/ACTA Press, (2007)CryptoCloak protocol and the prototype application., , and . CNS, page 721-722. IEEE, (2015)Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields., , and . IAS, page 314-319. IEEE, (2011)The Digital Signature Scheme MQQ-SIG., , , , , , and . IACR Cryptology ePrint Archive, (2010)On the Importance of the Key Separation Principle for Different Modes of Operation., , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 404-418. Springer, (2008)The Meshwork Ledger, its Consensus and Reward Mechanisms., and . COMSNETS, page 290-298. IEEE, (2021)DoS Attacks on Blockchain Ecosystem., and . Euro-Par Workshops, volume 13098 of Lecture Notes in Computer Science, page 230-242. Springer, (2021)VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept., , , , and . IECC, page 73-80. ACM, (2020)Web3 and Blockchain for Modernizing the Reseller Market., , , and . BCCA, page 215-220. IEEE, (2023)The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure., , and . IIH-MSP, page 1066-1071. IEEE Computer Society, (2009)