Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks., , , , , and . TRUST, volume 4968 of Lecture Notes in Computer Science, page 75-91. Springer, (2008)Bringing strong authentication and transaction security to the realm of mobile devices., , , and . IBM Journal of Research and Development, (2014)Secure password-based cipher suite for TLS., , , and . ACM Trans. Inf. Syst. Secur., 4 (2): 134-157 (2001)Meeting the Application in User Space., , , , , and . ACM SIGOPS European Workshop, page 82-87. ACM, (1994)IBM Secure Enterprise Desktop., , , , , , , , and . IBM Journal of Research and Development, (2014)Advanced Grid Programming with Components: A Biometric Identification Case Study., , , , and . COMPSAC, page 401-408. IEEE Computer Society, (2008)ePVM - An Embeddable Process Virtual Machine., , and . COMPSAC (1), page 557-564. IEEE Computer Society, (2007)A Banking Server's Display on your Key Chain., , , , , and . ERCIM News, (2008)Secure Password-Based Cipher Suite for TLS., , , and . NDSS, The Internet Society, (2000)The LADY programming environment for distributed operating systems., and . Future Generation Comp. Syst., 6 (3): 209-223 (1990)