| Publication | Date of Publication | Type |
|---|
Output feedback stabilization of large-scale networked cyberphysical systems using cryptographic techniques Journal of the Franklin Institute | 2023-08-31 | Paper |
| Provenance based classification access policy system based on encrypted search for cloud data storage | 2018-10-18 | Paper |
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks IEEE Transactions on Computers | 2017-05-16 | Paper |
Secure administration of cryptographic role-based access control for large-scale cloud storage systems Journal of Computer and System Sciences | 2014-07-29 | Paper |
Trust enhanced distributed authorisation for web services Journal of Computer and System Sciences | 2014-04-01 | Paper |
Membership encryption and its applications Information Security and Privacy | 2013-06-28 | Paper |
A pre-computable signature scheme with efficient verification for RFID Information Security Practice and Experience | 2012-06-29 | Paper |
A logic model for temporal authorization delegation with negation Lecture Notes in Computer Science | 2010-02-09 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
| scientific article; zbMATH DE number 2209391 (Why is no real title available?) | 2005-09-28 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Distributed Computing - IWDC 2004 Lecture Notes in Computer Science | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 2120043 (Why is no real title available?) | 2004-11-29 | Paper |
| scientific article; zbMATH DE number 2089443 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2080721 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2080684 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2059841 (Why is no real title available?) | 2004-03-17 | Paper |
| scientific article; zbMATH DE number 1996492 (Why is no real title available?) | 2004-03-16 | Paper |
| scientific article; zbMATH DE number 1980964 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1950357 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950349 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950350 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1857529 (Why is no real title available?) | 2003-05-19 | Paper |
| scientific article; zbMATH DE number 1808258 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1500475 (Why is no real title available?) | 2002-07-28 | Paper |
| scientific article; zbMATH DE number 1746670 (Why is no real title available?) | 2002-06-09 | Paper |
| scientific article; zbMATH DE number 1424187 (Why is no real title available?) | 2002-04-08 | Paper |
| scientific article; zbMATH DE number 1424177 (Why is no real title available?) | 2002-03-18 | Paper |
| scientific article; zbMATH DE number 1700046 (Why is no real title available?) | 2002-02-03 | Paper |
| scientific article; zbMATH DE number 1689603 (Why is no real title available?) | 2002-01-13 | Paper |
| scientific article; zbMATH DE number 1942816 (Why is no real title available?) | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1612525 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1583942 (Why is no real title available?) | 2001-04-03 | Paper |
| scientific article; zbMATH DE number 1500480 (Why is no real title available?) | 2001-03-04 | Paper |
| scientific article; zbMATH DE number 1504550 (Why is no real title available?) | 2001-01-04 | Paper |
Public key cryptosystems based on boolean permutations and their applications International Journal of Computer Mathematics | 2000-11-22 | Paper |
| scientific article; zbMATH DE number 1500498 (Why is no real title available?) | 2000-09-04 | Paper |
| scientific article; zbMATH DE number 1420970 (Why is no real title available?) | 2000-08-24 | Paper |
On the design of efficient RSA-based off-line electronic cash schemes Theoretical Computer Science | 2000-08-23 | Paper |
| scientific article; zbMATH DE number 1487951 (Why is no real title available?) | 2000-08-10 | Paper |
| scientific article; zbMATH DE number 1304304 (Why is no real title available?) | 1999-11-29 | Paper |
| scientific article; zbMATH DE number 1303965 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303977 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303978 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1189388 (Why is no real title available?) | 1998-08-13 | Paper |
A language for specifying sequences of authorization transformations and its applications Information and Communications Security | 1998-02-10 | Paper |
Cryptosystems based on permutation polynomials International Journal of Computer Mathematics | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 3965966 (Why is no real title available?) | 1986-01-01 | Paper |
Use of trapdoor structures in cryptography International Journal of Computer Mathematics | 1986-01-01 | Paper |
EXTENSION OF RSA CRYPTOSYSTEMS TO MATRIX RINGS Cryptologia | 1985-01-01 | Paper |