Author of the publication

Towards a Practical Secure Framework for Mobile Code Commerce.

, , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 164-178. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometrics, Access Control, Smart Cards: A not so Simple Combination., , and . CARDIS, volume 180 of IFIP Conference Proceedings, page 273-288. Kluwer, (2000)Robust Object Watermarking: Application to Code., , , and . Information Hiding, volume 1768 of Lecture Notes in Computer Science, page 368-378. Springer, (1999)Towards a Practical Secure Framework for Mobile Code Commerce., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 164-178. Springer, (2000)Montgomery Exponentiation with no Final Subtractions: Improved Results., and . CHES, volume 1965 of Lecture Notes in Computer Science, page 293-301. Springer, (2000)Which directions for asymmetric watermarking?, and . EUSIPCO, page 1-4. IEEE, (2002)