Author of the publication

Achieving Privacy in a Federated Identity Management System.

, , and . Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 51-70. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decomposition of algebraic functions., , and . ANTS, volume 877 of Lecture Notes in Computer Science, page 80-92. Springer, (1994)Polynomial Decomposition Algorithms., and . J. Symb. Comput., 7 (5): 445-456 (1989)Recommendations for Government Development and Use of Advanced Automated Systems to Make Decisions about Individuals., , , and . CoRR, (2024)Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard.. The American Mathematical Monthly, 111 (2): 89-117 (2004)Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy.. NSPW, page 1-19. ACM, (2020)Security, Liberty, and Electronic Communications.. CRYPTO, volume 3152 of Lecture Notes in Computer Science, page 355-372. Springer, (2004)Timesharing Dexter.. Logic and Program Semantics, volume 7230 of Lecture Notes in Computer Science, page 329-332. Springer, (2012)Privacy on the Line, and . Cambridge, MIT Press, (1998)Shrinking Lattice Polyhedra., and . SODA, page 188-193. SIAM, (1990)Privacy on the Line -- The Politics of Wiretapping and Encryption, and . The MIT Press, Cambridge, Massachusetts, (1998)