Author of the publication

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.

, , , , and . Computer Networks, 55 (15): 3246-3255 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and privacy in unified communications: Challenges and solutions., , , , , and . Computer Communications, (2015)Predictive protocol for the scalable identification of RFID tags through collaborative readers., , , and . Computers in Industry, 63 (6): 557-573 (2012)Practical Data-Oriented Microaggregation for Statistical Disclosure Control., and . IEEE Trans. Knowl. Data Eng., 14 (1): 189-201 (2002)Decapitation of networks with and without weights and direction: The economics of iterated attack and defense., and . Computer Networks, 55 (1): 119-130 (2011)Algorithm- sequenced access control.. Computers & Security, 10 (7): 639-652 (1991)Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints., and . Multimedia Syst., 20 (2): 105-125 (2014)Selecting Potentially Relevant Records Using Re-identification Methods., and . New Generation Comput., 22 (3): 239-252 (2004)Statistical Databases.. Wiley Encyclopedia of Computer Science and Engineering, John Wiley & Sons, Inc., (2008)Distance Computation between Two Private Preference Functions., , , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 460-470. Springer, (2014)Data Rank/Swapping.. Encyclopedia of Database Systems, Springer US, (2009)