Author of the publication

Establishing Chain of Evidence as a Base for Non-Repudiation Services.

, , and . SEC, volume 250 of IFIP Conference Proceedings, page 49-60. Kluwer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fair and Privacy-preserved Protocol for Sealed Bid Auctions., and . Electron. Mark., 11 (3): 163-170 (2001)ID-Based Structured Mulitsignature Schemes., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 45-59. Kluwer, (2001)Cryptanalysis on Schwartz Graphical Encryption Method., , and . Cryptologia, 17 (3): 301-304 (1993)Securing on-line credit card payments without disclosing privacy information., , and . Comput. Stand. Interfaces, 25 (2): 119-129 (2003)Scheduling with Sufficient Loosely Coupled Processors., , and . J. Parallel Distributed Comput., 9 (1): 87-92 (1990)A conventional approach to secret balloting in computer networks.. Comput. Secur., 15 (3): 249-262 (1996)Distributed assignment of cryptographic keys for access control in a hierarchy., , and . Comput. Secur., 13 (1): 79-84 (1994)Controlling Decryption of Personal Health Records in the Cloud., and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 69-79. Springer, (2011)Classifying Video Documents by Hierarchical Structure of Video Contents., , and . Comput. J., 43 (5): 396-410 (2000)A New Access Control Method Using Prime Factorisation., , and . Comput. J., 35 (1): 16-20 (1992)