Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of the TCG Privacy-CA Solution., and . EUC, page 609-616. IEEE Computer Society, (2010)Extended KCI attack against two-party key establishment protocols., and . Inf. Process. Lett., 111 (15): 744-747 (2011)Publicly Posted Composite Documents in Variably Ordered Workflows., , and . TrustCom, page 631-638. IEEE Computer Society, (2011)Du-Vote: Remote Electronic Voting with Untrusted Computers., , , and . CSF, page 155-169. IEEE Computer Society, (2015)Security of the Enhanced TCG Privacy-CA Solution., , and . TGC, volume 7173 of Lecture Notes in Computer Science, page 121-141. Springer, (2011)Anonymous Authentication for RFID Systems., , , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 158-175. Springer, (2010)A Privacy-Protecting Coupon System., , , , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 93-108. Springer, (2005)Public-Key Encryption with Registered Keyword Search., and . EuroPKI, volume 6391 of Lecture Notes in Computer Science, page 163-178. Springer, (2009)User-Friendly Grid Security Architecture and Protocols., , and . Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 139-156. Springer, (2005)Enforcing Sticky Policies with TPM and Virtualization., and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 32-47. Springer, (2011)