Author of the publication

Standardising Authentication Protocols Based on Public-Key Techniques.

, and . Journal of Computer Security, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C2 pseudo rolling ball filleting., and . Computing, 79 (2-4): 163-173 (2007)A Parametric Quartic Spline Interpolant to Position, Tangent and Curvature., and . Computing, 72 (1-2): 65-78 (2004)A high-voltage single-shot switch implemented with a MOSFET current source and avalanche diode., , and . IEEE Trans. Industrial Electronics, 44 (2): 167-172 (1997)Scenarios, state machines and purpose-driven testing., , and . ACM SIGSOFT Software Engineering Notes, 30 (4): 1-5 (2005)Investigation on greenhouse gas emissions and compost dynamics during in-vessel co-composting of septage and mixed organic wastes., , , and . Int. Journal of Environmental Science and Technology, (2019)Net-Centric Adapter for Legacy Systems., , and . IEEE Systems Journal, 3 (3): 336-342 (2009)Horizon based orientation estimation for planetary surface navigation., , , , , and . ICIP, page 4368-4372. IEEE, (2016)The application of knowledge management in call centres., , , and . J. Knowledge Management, 9 (4): 56-69 (2005)Standardising Authentication Protocols Based on Public-Key Techniques., and . Journal of Computer Security, (1993)Robust Stability Conditions for SISO Model Predictive Control Algorithms.. Automatica, 33 (7): 1357-1361 (1997)