Author of the publication

Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.

, , , , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 472-481. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De Bruijn sequences and complexity of symmetric functions., and . Cryptography and Communications, 3 (4): 207-225 (2011)Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions., and . IMA Int. Conf., volume 7089 of Lecture Notes in Computer Science, page 172-189. Springer, (2011)Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 138-152. Springer, (2007)Transitive q-Ary Functions over Finite Fields or Finite Sets: Counts, Properties and Applications.. WAIFI, volume 5130 of Lecture Notes in Computer Science, page 19-35. Springer, (2008)Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM., , , , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 472-481. Springer, (2007)