Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An e-payment Architecture Ensuring a High Level of Privacy Protection., , , , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 305-322. Springer, (2013)A comparative study of card-not-present e-commerce architectures with card schemes: What about privacy?, , , , and . J. Inf. Secur. Appl., (2018)Memory carving can finally unveil your embedded personal data., , , , and . ARES, page 18:1-18:9. ACM, (2017)Revisiting the accuracy of the biohashing algorithm on fingerprints.. IET Biom., 2 (3): 130-133 (2013)Memory Carving in Embedded Devices: Separate the Wheat from the Chaff., , , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 592-608. Springer, (2016)A Privacy-Preserving Contactless Transport Service for NFC Smartphones., , , , , and . MobiCASE, volume 130 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 282-285. Springer, (2013)The Linux Pseudorandom Number Generator Revisited., , , and . IACR Cryptology ePrint Archive, (2012)Analysis and construction of correctors.. IEEE Trans. Information Theory, 55 (10): 4742-4748 (2009)Synchronous One Time Biometrics with Pattern Based Authentication., and . ARES, page 260-265. IEEE Computer Society, (2016)Performance of Password Guessing Enumerators Under Cracking Conditions., , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 67-80. Springer, (2019)