Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal forgery on Sekhar's signature scheme with message recovery., , and . Int. J. Comput. Math., 81 (12): 1493-1495 (2004)A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing., , , , , and . CoRR, (2015)Defeating Malicious Servers in a Blind Signatures Based Voting System., , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 148-153. Springer, (2006)On Fair E-cash Systems Based on Group Signature Schemes., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 237-248. Springer, (2003)Achieving Optimal Anonymity in Transferable E-Cash with a Judge., , , , , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 206-223. Springer, (2011)Trusted Execution Environments: A Look under the Hood., , and . MobileCloud, page 259-266. IEEE Computer Society, (2014)Anonymous Services using Smart Cards and Cryptography., and . CARDIS, volume 153 of IFIP, page 83-98. Kluwer/Springer, (2004)Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant., , , and . Financial Cryptography Workshops, volume 9604 of Lecture Notes in Computer Science, page 224-232. Springer, (2016)On the Anonymity of Fair Offline E-cash Systems., and . Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, page 34-50. Springer, (2003)Private eCash in Practice (Short Paper)., , , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 99-109. Springer, (2016)