Author of the publication

A Low-Cost Packet Originator Verification for Metering at Access-Routers.

, and . Networked Group Communication, volume 2816 of Lecture Notes in Computer Science, page 287-297. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ein dezentrales Agentensystem unter Berücksichtigung von mehrseitiger Sicherheit.. University of Hagen, Germany, (2000)Resilient data aggregation for unattended WSNs., , , and . LCN, page 994-1002. IEEE Computer Society, (2011)C3-Sched - A cache covert channel robust cloud computing scheduler., and . ICITST, page 54-60. IEEE, (2014)Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption., , and . I4CS, page 95-103. (2014)Code Attestation with Compressed Instruction Code., and . IICS, volume P-186 of LNI, page 170-181. GI, (2011)Methods for Protecting a Mobile Agent's Route., , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 57-71. Springer, (1999)Protecting a Mobile Agent's Route against Collusions., , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)IPonAir - Drahtloses Internet der nächsten Generation., , , , , , , , , and 9 other author(s). Praxis der Informationsverarbeitung und Kommunikation, 26 (4): 190-196 (2003)A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme., , and . WISEC, page 29-40. ACM, (2009)Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles., , , , , , , , , and 2 other author(s). SIGCOMM, page 271-272. ACM, (2012)