Author of the publication

Tree-based Key Agreement for Multicast.

, , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signieren mit Chipkartensystemen in unsicheren Umgebungen - Homebanking mit Secure HBCI/FinTS., , and . Datenschutz und Datensicherheit, 31 (11): 816-821 (2007)Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit., , , and . Datenschutz und Datensicherheit, 31 (5): 338-342 (2007)Moderne Verfahren der Krypotgraphie - von RSA zu Zero-Knowledge (6. Aufl.)., , and . Vieweg, (2006)XSpRES - Robust and Effective XML Signatures for Web Services., , , and . CLOSER, page 187-197. SciTePress, (2012)Penetration Testing Tool for Web Services Security., , and . SERVICES, page 163-170. IEEE Computer Society, (2012)Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on., , and . EuroS&P, page 321-336. IEEE, (2016)How to Break Microsoft Rights Management Services., , , and . WOOT, USENIX Association, (2016)Scriptless attacks: Stealing more pie without touching the sill., , , , and . Journal of Computer Security, 22 (4): 567-599 (2014)Provably Secure Framework for Information Aggregation is Sensor Networks., and . IACR Cryptology ePrint Archive, (2007)Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos.. IACR Cryptology ePrint Archive, (2013)