Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matrix-tree based hybrid broadcast encryption., , and . GLOBECOM Workshops, page 61-65. IEEE, (2011)Enhancing TPM Security by Integrating SRAM PUFs Technology., , and . CPSS@AsiaCCS, page 82-93. ACM, (2016)Application-Level Multicast Using DINPeer in P2P Networks., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 754-761. Springer, (2005)Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems., , , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 9-26. Springer, (2018)An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks., , and . AINA, page 675-682. IEEE Computer Society, (2009)Secure wireless communication platform for EV-to-Grid research., , , , and . IWCMC, page 21-25. ACM, (2010)DINPeer: An Optimized P2P Communication Network for Advanced Collaborative Environments., , and . PDPTA, page 564-570. CSREA Press, (2005)Secure wireless vehicle monitoring and control., , , and . APSCC, page 81-86. IEEE, (2009)A DINloop-Based Inter-domain Multicast Using MPLS., , and . ISCC, page 406-411. IEEE Computer Society, (2005)DINCast: Optimizing Application-Level Shared-Tree Multicast., , , , and . AINA, page 270-277. IEEE Computer Society, (2009)