Author of the publication

Broadcast Enforced Threshold Schemes with Disenrollment.

, and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 101-116. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Mitigating the Coremelt Attack., , , , , and . ACC, page 3410-3416. IEEE, (2018)Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems., , and . CDC, page 6918-6925. IEEE, (2018)Spatial-Temporal Access Control for E-health Services., , , and . NAS, page 269-276. IEEE Computer Society, (2010)Maximizing static network lifetime of wireless broadcast ad hoc networks., and . ICC, page 2256-2261. IEEE, (2003)Optimized flow allocation for anonymous communication in multipath wireless networks., , and . ISIT, page 219-223. IEEE, (2012)On the Authentication of RFID Systems with Bitwise Operations., and . NTMS, page 1-6. IEEE, (2008)Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport., and . Proceedings of the IEEE, 101 (8): 1834-1855 (2013)Special Issue on Cyber-Physical Systems Scanning the Issue., , , , , , and . Proceedings of the IEEE, 100 (1): 6-12 (2012)Cross-layer design for energy-efficient secure multicast communications in ad hoc networks., and . ICC, page 3633-3639. IEEE, (2004)Passivity framework for composition and mitigation of multi-virus propagation in networked systems., , , and . ACC, page 2453-2460. IEEE, (2015)