Author of the publication

Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography.

, , and . SIGACT News, 41 (1): 75-98 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial., , and . Int. J. Inf. Sec., 1 (1): 1-2 (2001)A k-out-of-n Ring Signature with Flexible Participation for Signers., , , and . IACR Cryptology ePrint Archive, (2018)Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications., , and . IACR Cryptology ePrint Archive, (2011)A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl., , , , and . IACR Cryptology ePrint Archive, (2012)An Efficient ID-based Digital Signature with Message Recovery Based on Pairing., , , and . IACR Cryptology ePrint Archive, (2006)Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography., , and . SIGACT News, 41 (1): 75-98 (2010)A Comparison of Time Domain Equalizers by Block Processing in SISO Single Carrier Transmission., , and . PIMRC, page 1-5. IEEE, (2007)A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI., , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 136-149. Springer, (2002)A Novel Range Test., , , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 247-258. Springer, (2006)A Novel Method to Maintain Privacy in Mobile Agent Applications., , , , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 247-260. Springer, (2005)