Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Ephemeral Pairing Problem.. Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 212-226. Springer, (2004)Privacy Design Strategies - (Extended Abstract).. SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 446-459. Springer, (2014)Secure and Self-stabilizing Clock Synchronization in Sensor Networks., , , and . SSS, volume 4838 of Lecture Notes in Computer Science, page 340-356. Springer, (2007)Private Handshakes.. ESAS, volume 4572 of Lecture Notes in Computer Science, page 31-42. Springer, (2007)Distributed Double Spending Prevention.. Security Protocols Workshop, volume 5964 of Lecture Notes in Computer Science, page 152-165. Springer, (2007)Securing Data Accountability in Decentralized Systems., , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 626-635. Springer, (2006)Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 364-377. (2005)Spam Filter Analysis., , and . SEC, volume 147 of IFIP, page 395-410. Kluwer / Springer, (2004)A Critical Analysis of Privacy Design Strategies., , and . IEEE Symposium on Security and Privacy Workshops, page 33-40. IEEE Computer Society, (2016)Self-Stabilization of Wait-Free Shared Memory Objects., , and . J. Parallel Distrib. Comput., 62 (5): 818-842 (2002)