Author of the publication

Key substitution attacks revisited: Taking into account malicious signers

, , and . International Journal of Information Security, 5 (1): 30--36 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Electronic Voting Machines on the Example of Bingo Voting, , , , and . IEEE Transactions on Information Forensics and Security, (2009)Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator, , and . E-Voting and Identity, VOTE-ID 2007, volume 4896 of Lecture Notes in Computer Science, page 111--124. Springer, (2007)Fairness and Correctness in Case of a Premature Abort, , and . Progress in Cryptology -- INDOCRYPT 2005, volume 3797 of Lecture Notes in Computer Science, page 322--331. Springer, (2005)Key substitution attacks revisited: Taking into account malicious signers, , and . International Journal of Information Security, 5 (1): 30--36 (2006)On Group Key Agreement with Cheater Identification, , and . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)