Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties., , and . INFOCOM, page 1401-1405. IEEE Computer Society, (2000)Optimistic protocol for certified electronic mail with verifiable TTP., , , and . Comput. Stand. Interfaces, (2018)A Hard-Timeliness Blockchain-Based Contract Signing Protocol., and . Comput., 12 (12): 246 (November 2023)A Juridical Validation of a Contract Signing Protocol., , , and . EC-Web, volume 2455 of Lecture Notes in Computer Science, page 343-352. Springer, (2002)A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons., , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 165-176. Springer, (2017)Anonymous and Transferable Electronic Ticketing Scheme., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 100-113. Springer, (2013)Cross-Layer Secrecy Design on TCP/IP and 802.11 for Energy Saving., , , , and . NTMS, page 1-5. IEEE, (2011)Anonymous and Fair Micropayment Scheme with Protection against Coupon Theft., , , and . Int. J. Adapt. Resilient Auton. Syst., 4 (2): 54-71 (2013)A Secure Solution for a Blockchain-Based Consortium Promotional Scheme., , and . IEEE Access, (2022)A 2020 perspective on Ä fair contract signing protocol with blockchain support"., and . Electron. Commer. Res. Appl., (2020)