Author of the publication

Extensions of the Diffie-Hellman Key Agreement Protocol Based on Exponential and Logarithmic Functions.

, and . ACIIDS (2), volume 13758 of Lecture Notes in Computer Science, page 569-581. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State Model of Service Reliability.. DepCoS-RELCOMEX, page 35-42. IEEE Computer Society, (2006)Minimum node weight spanning trees searching algorithm for broadcast transmission in sensor networks.. ICDIM, page 150-154. IEEE, (2017)Maximum Lifetime Problem in Sensor Networks with Limited Channel Capacity.. KES-IDT (1), volume 56 of Smart Innovation, Systems and Technologies, page 151-163. Springer, (2016)Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor Networks.. CN, volume 608 of Communications in Computer and Information Science, page 59-71. Springer, (2016)Stability Analysis of Routing Strategies for the Maximum Lifetime Problem in One-Dimensional Ad-Hoc Wireless Networks.. 3PGCIC, volume 13 of Lecture Notes on Data Engineering and Communications Technologies, page 819-832. Springer, (2017)UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case Study.. DepCoS-RELCOMEX, page 50-57. IEEE Computer Society, (2009)Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra.. Appl. Algebra Eng. Commun. Comput., 32 (1): 81-96 (2021)On the role of symmetry in solving maximum lifetime problem in two-dimensional sensor networks.. Wireless Networks, 23 (3): 975-984 (2017)Extensions of the Diffie-Hellman Key Agreement Protocol Based on Exponential and Logarithmic Functions., and . ACIIDS (2), volume 13758 of Lecture Notes in Computer Science, page 569-581. Springer, (2022)Symmetric and Asymmetric Cryptography on the Special Linear Cracovian Quasigroup., and . ACIIDS (2), volume 13758 of Lecture Notes in Computer Science, page 643-655. Springer, (2022)