From post

Trust*: Using Local Guarantees to Extend the Reach of Trust.

, , и . Security Protocols Workshop, том 7028 из Lecture Notes in Computer Science, стр. 171-178. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gearing Up: How to Eat Your Cryptocake and Still Have It., и . Security Protocols Workshop, том 7114 из Lecture Notes in Computer Science, стр. 258-259. Springer, (2011)Anonymous Context Based Role Activation Mechanism., , и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 315-321. Springer, (2005)Concluding Discussion: When Does Confidentiality Harm Security?. Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 229-238. Springer, (2001)Pictures Can't Lie under Oath., , и . Security Protocols Workshop, том 1796 из Lecture Notes in Computer Science, стр. 208-218. Springer, (1999)Anonymous Context Based Role Activation Mechanism.. Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 322-328. Springer, (2005)Introduction: What's Happening on the Other Channel? (Transcript of Discussion).. Security Protocols Workshop, том 8263 из Lecture Notes in Computer Science, стр. 1-2. Springer, (2013)Introduction: Authentic Privacy.. Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 1-3. Springer, (2004)Anonymous Authentication (Transcript of Discussion).. Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 306-311. Springer, (2004)Trust*: Using Local Guarantees to Extend the Reach of Trust.. Security Protocols Workshop, том 7028 из Lecture Notes in Computer Science, стр. 179-188. Springer, (2009)Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion).. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 184-193. Springer, (2000)