Author of the publication

Access Control in Federated Databases: How Legal Issues Shape Security.

, , , , , and . EGOV, volume 4656 of Lecture Notes in Computer Science, page 228-239. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling denial of service attacks on JFK with Meadows's cost-based framework., , and . ACSW, volume 54 of CRPIT, page 125-134. Australian Computer Society, (2006)Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 166-179. Springer, (2003)Efficient One-Round Key Exchange in the Standard Model., , , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 69-83. Springer, (2008)GBD Threshold Cryptography with an Application to RSA Key Recovery., , , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 394-405. Springer, (2005)Attribute-Based Authenticated Key Exchange., , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 300-317. Springer, (2010)Automating Computational Proofs for Public-Key-Based Key Exchange., , and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 53-69. Springer, (2010)Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions., , and . INDOCRYPT, volume 4329 of Lecture Notes in Computer Science, page 176-190. Springer, (2006)Improving the Efficiency of RFID Authentication with Pre-Computation., , and . AISC, volume 125 of CRPIT, page 91-100. Australian Computer Society, (2012)Automated Proofs for Computational Indistinguishability., , and . Comput. J., 57 (10): 1513-1536 (2014)Verifier-Key-Flexible Universal Designated-Verifier Signatures., , , , and . IMACC, volume 4887 of Lecture Notes in Computer Science, page 403-421. Springer, (2007)