Author of the publication

Integration of Signature Encryption and Key Exchange.

, and . CIS (2), page 299-302. IEEE Computer Society, (2008)978-0-7695-3508-1.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A control loop approach for integrating the future decentralized power markets and grids., , , , , and . SmartGridComm, page 588-593. IEEE, (2013)Integration of Signature Encryption and Key Exchange., and . CIS (2), page 299-302. IEEE Computer Society, (2008)978-0-7695-3508-1.Multicast Algorithms for Multi-Channel Wireless Mesh Networks., , , , and . ICNP, page 1-10. IEEE Computer Society, (2007)Ultralow power processor employing block instruction for ECG applications., , , , and . IEICE Electronic Express, 13 (2): 20150493 (2016)Efficient Multicast Algorithms for Multichannel Wireless Mesh Networks., , , , and . IEEE Trans. Parallel Distrib. Syst., 21 (1): 86-99 (2010)Research on automated rollbackability of intrusion response., , and . Journal of Computer Security, 12 (5): 737-751 (2004)Identifying effective influencers based on trust for electronic word-of-mouth marketing: A domain-aware approach., , , , , and . Inf. Sci., (2015)Solving the minimum bisection problem using a biologically inspired computational model., , , and . Theor. Comput. Sci., 411 (6): 888-896 (2010)Information Entropy Model for Anonymity Measurement., , and . INCoS, page 192-195. IEEE, (2013)Simulation Algorithm for Energy-Efficient Train Control under Moving Block System., , , and . CSIE (5), page 498-502. IEEE Computer Society, (2009)