Author of the publication

Electronic Payment Systems with Fair On-line Verification.

, , and . SEC, volume 175 of IFIP Conference Proceedings, page 451-460. Kluwer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation., , , , and . AINA Workshops (1), page 385-391. IEEE Computer Society, (2007)Evaluating the Effects of Model Generalization on Intrusion Detection Performance., , and . SEC, volume 232 of IFIP, page 421-432. Springer, (2007)SCARR: A Novel Scalable Runtime Remote Attestation., , , , and . CoRR, (2018)Minimizing TTP's involvement in signature validation., , and . Int. J. Inf. Sec., 5 (1): 37-47 (2006)Routing optimization security in mobile IPv6., , , , , and . Computer Networks, 50 (13): 2401-2419 (2006)Time-Bound Anonymous Authentication for Roaming Networks., , , , , and . IEEE Trans. Information Forensics and Security, 10 (1): 178-189 (2015)Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption., , , , and . IEEE Trans. Information Forensics and Security, 10 (3): 665-678 (2015)Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks., , , and . Security and Communication Networks, 4 (1): 11-22 (2011)A New Functional Encryption for Multidimensional Range Query., , and . IACR Cryptology ePrint Archive, (2017)Authentication and Key Establishment in Dynamic Wireless Sensor Networks., , , and . Sensors, 10 (4): 3718-3731 (2010)