Author of the publication

Secure Books: Protecting the Distribution of Knowledge.

, , , , and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 1-11. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From zero-knowledge to a practical authentication protocol.. SEC, volume 54 of IFIP Conference Proceedings, page 496-497. Chapman & Hall, (1996)Security of biometric authentication systems., and . CISIM, page 19-28. IEEE, (2010)Biometric authentication - security and usability., and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 227-239. Kluwer, (2002)Evidence processing and privacy issues in evidence-based reputation systems., , and . Comput. Stand. Interfaces, 27 (5): 533-545 (2005)Toward Reliable User Authentication through Biometrics., and . IEEE Secur. Priv., 1 (3): 45-49 (2003)Pseudonymity in the Light of Evidence-Based Trust., and . Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, page 267-274. Springer, (2004)WWW security and trusted third party services., , and . Future Gener. Comput. Syst., 16 (4): 331-341 (2000)Secure Books: Protecting the Distribution of Knowledge., , , , and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 1-11. Springer, (1997)The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Random Number Generation Based on Fingerprints., , , and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 170-182. Springer, (2010)