Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flow-based reputation with uncertainty: evidence-based subjective logic., , and . Int. J. Inf. Sec., 15 (4): 381-402 (2016)Physical Unclonable Functions for enhanced security of tokens and tags., and . ISSE, page 30-37. Vieweg, (2006)A simpler security proof for 6-state quantum key distribution., and . Quantum Inf. Comput., 23 (11&12): 949-960 (September 2023)Quantum digital signatures with smaller public keys.. Quantum Inf. Comput., 21 (11&12): 955-973 (2021)Dynamic Tardos Traitor Tracing Schemes., , , , and . IEEE Trans. Inf. Theory, 59 (7): 4230-4242 (2013)Flow-Based Reputation: More than Just Ranking., , and . Int. J. Inf. Technol. Decis. Mak., 11 (3): 551-578 (2012)Security proof for round-robin differential phase shift QKD., and . Quantum Inf. Process., 17 (10): 250 (2018)Authenticated communication from quantum readout of PUFs., , and . Quantum Inf. Process., 16 (8): 200 (2017)Verifiable Rotation of Homomorphic Encryptions., , , and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 393-410. Springer, (2009)The Spammed Code Offset Method., and . IEEE Trans. Inf. Forensics Secur., 9 (5): 875-884 (2014)