Search results

  • 2003

    Resisting malicious packet dropping in wireless ad hoc networks

    Just, M., Kranakis, E. & Wan, T., 2003, Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2003. Springer, Vol. 2865. p. 151-163 (Ad-Hoc, Mobile, and Wireless Networks; vol. 2865).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

    31 Citations (Scopus)
  • 1999

    Addressing the Problem of Undetected Signature Key Compromise

    Just, M. & Oorschot, P. C. V., 1999, Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. Reston (Virginia): The Internet Society, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1998

    Some Timestamping Protocol Failures

    Just, M., 1998, Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA. Reston (Virginia): The Internet Society, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1996

    Authenticated multi-party key agreement

    Just, M. & Vaudenay, S., 1996, Advances in Cryptology - ASIACRYPT '96. New York (New York): Springer, p. 36-49 14 p. Chapter 4. (Lecture Notes in Computer Science Book Series (LNCS); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

    147 Citations (Scopus)
  • 1994

    On key distribution via true broadcasting

    Just, M., Kranakis, E., Krizanc, D. & Van Oorschot, P., Nov 1994, Proceedings of the 2nd ACM Conference on Computer & Communications Security. Denning, D. (ed.). New York (New York): Association for Computing Machinery, p. 81-88 8 p. (Proceedings of the ACM Conferences; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

    Open Access
    29 Citations (Scopus)