Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial Fairness and Liveness., , , and . CSFW, page 160-174. IEEE Computer Society, (2002)ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead., , and . Kommunikation in Verteilten Systemen, volume 267 of Informatik-Fachberichte, page 451-463. Springer, (1991)Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule., , , and . VIS, page 329-. Vieweg, (1995)Effiziente Software-Implementierung des GMR-Signatursystems., and . VIS, volume 271 of Informatik-Fachberichte, page 329-345. Springer, (1991)Fail-stop-Signaturen und ihre Anwendung., and . VIS, volume 271 of Informatik-Fachberichte, page 289-301. Springer, (1991)Privacy in enterprise identity federation - policies for Liberty 2 single sign on.. Inf. Sec. Techn. Report, 9 (1): 45-58 (2004)Self-Escrowed Cash against User Blackmailing., and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 42-52. Springer, (2000)Managing business health in the presence of malicious attacks., , , , , , , , and . DSN Workshops, page 9-14. IEEE Computer Society, (2011)Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation., , and . FME, volume 2391 of Lecture Notes in Computer Science, page 310-329. Springer, (2002)Anonymous Fingerprinting with Direct Non-repudiation., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 401-414. Springer, (2000)