Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy of Selectively Encrypted Strings., and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 234-243. Springer, (2011)Middleware Support for Tunable Encryption., , and . Wireless Information Systems, page 36-46. INSTICC Press, (2006)Guesswork changes in multi-processor attacks., and . IAS, page 145-150. IEEE, (2011)On the Relationship between Confidentiality Measures: Entropy and Guesswork., , and . WOSIS, page 135-144. INSTICC Press, (2007)Performance analysis and improvement of PR-SCTP for small messages., , , and . Computer Networks, 57 (18): 3967-3986 (2013)A Model-based Analysis of Tunability in Privacy Services., , and . FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 343-356. Springer, (2007)An investigation of entropy of selectively encrypted bitmap images., and . CASoN, page 238-243. IEEE, (2012)On the Fundamentals of Anonymity Metrics., and . FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 325-341. Springer, (2007)Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages., , , and . Quality of Protection, volume 23 of Advances in Information Security, Springer, (2006)Extending the definition of guesswork., and . IAS, page 191-196. IEEE, (2010)