Author of the publication

Principles for Entity Authentication.

, , and . Ershov Memorial Conference, volume 2890 of Lecture Notes in Computer Science, page 294-306. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability., , , , and . NDSS, The Internet Society, (2019)WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring., , , , , and . USENIX Security Symposium, page 1493-1510. USENIX Association, (2018)Symbolic Malleable Zero-Knowledge Proofs., , , , and . CSF, page 412-426. IEEE Computer Society, (2015)Authenticity by tagging and typing., , and . FMSE, page 1-12. ACM, (2004)Differentially private data aggregation with optimal utility., , , , and . ACSAC, page 316-325. ACM, (2014)Computationally Sound Abstraction and Verification of Secure Multi-Party Computations., , and . FSTTCS, volume 8 of LIPIcs, page 352-363. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2010)Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol., , and . IEEE Symposium on Security and Privacy, page 202-215. IEEE Computer Society, (2008)Securing social networks., , and . PODC, page 341-342. ACM, (2011)Brief announcement: anonymity and trust in distributed systems., , , and . PODC, page 237-238. ACM, (2010)Verifying Relational Properties using Trace Logic., , , , , and . FMCAD, page 170-178. IEEE, (2019)