Author of the publication

Some Remarks on Authentication Systems.

, , , and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 122-139. Springer, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Viable Grid Marketplace., and . ISPA, page 427-432. IEEE Computer Society, (2010)On the (In)Security of Two Buyer-Seller Watermarking Protocols., and . SECRYPT, page 253-260. INSTICC Press, (2008)Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures., , and . Cryptography and Communications, 3 (2): 65-86 (2011)Localised multisecret sharing., , , and . Cryptography and Communications, 9 (5): 581-597 (2017)Cumulative Arrays and Geometric Secret Sharing Schemes., and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 48-55. Springer, (1992)Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure., and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 143-152. Springer, (2009)Constructing Key Assignment Schemes from Chain Partitions., , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 130-145. Springer, (2010)Threshold MACs., , , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 237-252. Springer, (2002)Size of Broadcast in Threshold Schemes with Disenrollment., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 71-88. Springer, (2002)Multisecret Threshold Schemes., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 126-135. Springer, (1993)