Author of the publication

Anonymous k -Show Credentials.

, and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 181-192. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol., , and . I. J. Network Security, 5 (3): 288-298 (2007)Privacy-Preserving Telemonitoring for eHealth., , , , and . DBSec, volume 5645 of Lecture Notes in Computer Science, page 95-110. Springer, (2009)A survey on the application of Neural Networks in the safety assessment of oil and gas pipelines., , and . CIES, page 95-102. IEEE, (2014)Anonymous k -Show Credentials., and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 181-192. Springer, (2007)Controlling access to personal data through Accredited Symmetrically Private Information Retrieval.. IACR Cryptology ePrint Archive, (2008)A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System., , , and . EuroPKI, volume 5057 of Lecture Notes in Computer Science, page 118-133. Springer, (2008)On the Correctness of an Intrusion-Tolerant Group Communication Protocol., , and . CHARME, volume 2860 of Lecture Notes in Computer Science, page 231-246. Springer, (2003)Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval., , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 387-402. Springer, (2008)Accredited Symmetrically Private Information Retrieval.. IWSEC, volume 4752 of Lecture Notes in Computer Science, page 262-277. Springer, (2007)