Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Escrowed decryption protocols for lawful interception of encrypted data., , and . IET Information Security, 13 (5): 498-507 (2019)Eliciting metrics for accountability of cloud systems., , and . Computers & Security, (2016)The Interaction Between Individuals' Immersive Tendencies and the Sensation of Presence in a Virtual Environment., , , , , and . EGVE, page 65-74. Eurographics Association, (2000)Query Privacy in Sensing-as-a-Service Platforms., , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 141-154. Springer, (2017)Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services., , and . CloudCom, page 241-248. IEEE Computer Society, (2012)NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU., , and . AsiaCCS, page 179-189. ACM, (2015)What's cookin?: a platform for remote collaboration., , , , and . CHI Extended Abstracts, page 2799-2800. ACM, (2013)An evaluation of ID: an eigenface based construction system., , , and . South Afr. Comput. J., (2006)Attacks to a proxy-mediated key agreement protocol based on symmetric encryption., , and . IACR Cryptology ePrint Archive, (2016)On the application of generic CCA-secure transformations to proxy re-encryption., , and . Security and Communication Networks, 9 (12): 1769-1785 (2016)