Author of the publication

Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.

, , , , and . DCNET/OPTICS, page 75-78. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Petri Net Representations of Cryptographic Workflows in Electronic Government.. HICSS, page 1-10. IEEE Computer Society, (2011)Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values.. AINA Workshops (1), page 404-408. IEEE Computer Society, (2007)Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper., , , , and . DCNET/OPTICS, page 75-78. SciTePress, (2011)Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper., , , , and . DCNET/OPTICS, page 125-128. SciTePress, (2010)Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion., and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 57-70. Springer, (2012)A Coloured Petri Net Trust Model.. DEXA Workshops, page 415-419. IEEE Computer Society, (2003)A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net.. Business Process Management, volume 2678 of Lecture Notes in Computer Science, page 232-245. Springer, (2003)Reducing the Complexity in the Distributed Computation of Private RSA Keys.. ACISP, volume 5594 of Lecture Notes in Computer Science, page 250-263. Springer, (2009)Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography., , , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 74-81. Springer, (2011)Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol.. SECURWARE, page 286-291. IEEE Computer Society, (2009)