Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fourth-factor authentication: somebody you know., , , , and . CCS, page 168-178. ACM, (2006)Analysis of associative retrieval algorithms.. Stanford University, USA, (1974)How to Leak a Secret., , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 552-565. Springer, (2001)On Data Banks and Privacy Homomorphisms, , and . Foundations of secure computation, (1978)The RC5 Encryption Algorithm. MIT Laboratory for Computer Science, Cambridge, Massachusetts, (March 1997)A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks, , and . SIAM J. Comput., 17 (2): 281--308 (April 1988)Certificate chain discovery in SPKI/SDSI, , , , , and . Journal of Computer Security, (2001)On the Optimality of Elia's Algorithm for Performing Best-Match Searches.. IFIP Congress, page 678-681. (1974)How to tell if your cloud files are vulnerable to drive crashes., , , , and . CCS, page 501-514. ACM, (2011)An Application of Number Theory to the Organization of Raster-Graphics Memory (Extended Abstract), , and . FOCS, page 92-99. IEEE Computer Society, (1982)