Author of the publication

Design and Implementation of a Key-Lifecycle Management System.

, , , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 160-174. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying a Web-Service-Based Model to Dynamic Service-Deployment., , , , and . CIMCA/IAWTIC, page 128-133. IEEE Computer Society, (2005)Service deployment in programmable networks.. ETH Zurich, (2003)Towards a service-enabled distributed router architecture., , , , , and . IET Circuits, Devices & Systems, 2 (1): 60-68 (2008)Disk Scrubbing Versus Intradisk Redundancy for RAID Storage Systems., , , and . TOS, 7 (2): 5:1-5:42 (2011)Editorial: A Successful Year and Looking Forward to 2017 and Beyond., , , , , , , , , and 7 other author(s). IEEE Trans. Neural Netw. Learning Syst., 28 (1): 2-7 (2017)Design and Implementation of a Key-Lifecycle Management System., , , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 160-174. Springer, (2010)Robust data sharing with key-value stores., , , , and . PODC, page 221-222. ACM, (2011)Container Marking: Combining Data Placement, Garbage Collection and Wear Levelling for Flash., , and . MASCOTS, page 237-247. IEEE Computer Society, (2011)Effect of Replica Placement on the Reliability of Large-Scale Data Storage Systems., , , , and . MASCOTS, page 79-88. IEEE Computer Society, (2010)WANTED: a theft-deterrent solution for the pervasive computing world., , and . ICCCN, page 374-379. IEEE, (2000)