| Publication | Date of Publication | Type |
|---|
Restrained medium access control on adversarial shared channels Journal of Computer and System Sciences | 2023-08-21 | Paper |
Generalized framework for group testing: queries, feedbacks and adversaries Theoretical Computer Science | 2022-05-10 | Paper |
Stronger trust and privacy in social networks via local cooperation Journal of Complex Networks | 2021-06-04 | Paper |
Fast size approximation of a radio network in beeping model Theoretical Computer Science | 2020-02-06 | Paper |
Fault-tolerant parallel scheduling of arbitrary length jobs on a shared channel | 2020-01-30 | Paper |
Ordered and delayed adversaries and how to work against them on a shared channel Distributed Computing | 2019-11-27 | Paper |
On delta-method of moments and probabilistic sums 2013 Proceedings of the Tenth Workshop on Analytic Algorithmics and Combinatorics (ANALCO) | 2019-09-17 | Paper |
On location hiding in distributed systems | 2018-04-12 | Paper |
Randomized mutual exclusion on a multiple access channel Distributed Computing | 2017-04-04 | Paper |
A note on invariant random variables | 2017-02-10 | Paper |
Approximating the size of a radio network in beeping model Structural Information and Communication Complexity | 2016-12-01 | Paper |
Practical fault-tolerant data aggregation Applied Cryptography and Network Security | 2016-10-04 | Paper |
Energy-optimal algorithms for computing aggregative functions in random networks Discrete Mathematics and Theoretical Computer Science. DMTCS | 2016-08-23 | Paper |
On the dynamics of systems of urns | 2015-12-03 | Paper |
Provable unlinkability against traffic analysis with low message overhead Journal of Cryptology | 2015-08-03 | Paper |
On flooding in the presence of random faults Fundamenta Informaticae | 2013-06-27 | Paper |
Energy efficient alert in single-hop networks of extremely weak devices Theoretical Computer Science | 2012-10-11 | Paper |
DYNAMIC SHARING OF A MULTIPLE ACCESS CHANNEL | 2012-01-23 | Paper |
Event Extent Estimation Structural Information and Communication Complexity | 2010-06-17 | Paper |
Step-out group signatures Computing | 2009-08-10 | Paper |
scientific article; zbMATH DE number 5527898 (Why is no real title available?) | 2009-03-11 | Paper |
Random Subsets of the Interval and P2P Protocols Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 2009-02-17 | Paper |
Step-Out Ring Signatures Lecture Notes in Computer Science | 2009-02-03 | Paper |
Distributed Verification of Mixing - Local Forking Proofs Model Information Security and Privacy | 2008-07-08 | Paper |
Extended Sanitizable Signatures Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
Forward-Secure Key Evolution in Wireless Sensor Networks Cryptology and Network Security | 2008-04-15 | Paper |
Practical Deniable Encryption SOFSEM 2008: Theory and Practice of Computer Science | 2008-03-07 | Paper |
Universal re-encryption of signatures and controlling anonymous information flow | 2007-02-13 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
SOFSEM 2005: Theory and Practice of Computer Science Lecture Notes in Computer Science | 2005-12-07 | Paper |