Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traceable Signatures., , and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 571-589. Springer, (2004)A Solution for Wireless Privacy and Payments based on E-cash., , and . SecureComm, page 206-218. IEEE, (2005)Mis-representation of Identities in E-cash Schemes and how to Prevent it., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 276-285. Springer, (1996)Group Encryption., , and . ASIACRYPT, volume 4833 of Lecture Notes in Computer Science, page 181-199. Springer, (2007)Easy Come - Easy Go Divisible Cash., , and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 561-575. Springer, (1998)On the Security of ElGamal Based Encryption., and . Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science, page 117-134. Springer, (1998)Electronic Payments: Where Do We Go from Here?., , , and . CQRE, volume 1740 of Lecture Notes in Computer Science, page 43-63. Springer, (1999)"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash., , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 286-300. Springer, (1996)Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems., , and . S&P, page 66-76. IEEE Computer Society, (1998)Exact Analysis of Exact Change: The k-Payment Problem., , and . SIAM J. Discret. Math., 13 (4): 436-453 (2000)