Author of the publication

Protecting a Mobile Agent's Route against Collusions.

, , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kaderali, Firoz
add a person with the name Kaderali, Firoz
 

Other publications of authors with the same name

Bezahlen in der Virtuellen Universität., , , and . D-CSCL, page 261. Physica-Verlag / Springer, (2000)Media Publishing in Distance Teaching., , and . J. UCS, 2 (6): 492-502 (1996)Group Key Agreement Protocol Based on GH-KEP., , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 619-623. Springer, (2004)Virtuelle Universität - Neue Medien in der Lehre., , and . LOG IN, 18 (6): 25- (1998)Die Rolle der Kryptologie in der Kommunikationstechnik., , and . it+ti - Informationstechnik und Technische Informatik, 41 (1): 42-47 (1999)Protecting a Mobile Agent's Route against Collusions., , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)On Central Spanning Trees of a Graph., , and . Combinatorics and Computer Science, volume 1120 of Lecture Notes in Computer Science, page 53-57. Springer, (1995)Methods for Protecting a Mobile Agent's Route., , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 57-71. Springer, (1999)Aufbau und Betrieb einer Virtuellen Universität - Erfahrungen an der FernUniversität Hagen (Development and Operation of a Virtual University - Experiences at the FernUniversität Hagen)., and . it+ti - Informationstechnik und Technische Informatik, 44 (4): 205-210 (2002)On Modeling of Instant Messaging Traffic., and . ISCA PDCCS, page 152-158. ISCA, (2008)