Author of the publication

Mutual Authentication for Low-Power Mobile Devices.

, and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 169-186. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scambaiter: Understanding Targeted Nigerian Scams on Craigslist., , , , and . NDSS, The Internet Society, (2014)The Threat of Political Phishing., , and . HAISA, page 126-143. University of Plymouth, (2008)Modeling and Preventing Phishing Attacks.. Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 89. Springer, (2005)Improved Magic Ink Signatures Using Hints., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 253-268. Springer, (1999)Mix-Based Electronic Payments., and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 157-173. Springer, (1998)Security of Signed ElGamal Encryption., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 73-89. Springer, (2000)Optimistic Mixing for Exit-Polls., , , , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 451-465. Springer, (2002)Scramble All, Encrypt Small., , and . FSE, volume 1636 of Lecture Notes in Computer Science, page 95-111. Springer, (1999)Secure Server-Aided Signature Generation., and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 383-401. Springer, (2001)Cryptographic Approaches to Provacy in Forensic DNA Databases., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 373-390. Springer, (2000)