Author of the publication

The Design and Implementation of a Secure Auction Service.

, and . IEEE Trans. Software Eng., 22 (5): 302-312 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Authentication with Subset Queries (extended abstract)., and . ACM Conference on Computer and Communications Security, page 113-119. ACM, (1999)Mutual Search (Extended Abstract)., , , , , and . SODA, page 481-489. ACM/SIAM, (1998)Efficient generation of shared RSA keys., and . J. ACM, 48 (4): 702-722 (2001)Weakly-Private Secret Sharing Schemes., and . TCC, volume 4392 of Lecture Notes in Computer Science, page 253-272. Springer, (2007)Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 90-102. Springer, (1998)Secure and Efficient Off-Line Digital Money (Extended Abstract)., and . ICALP, volume 700 of Lecture Notes in Computer Science, page 265-276. Springer, (1993)Identity-Based Encryption from the Weil Pairing., and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 213-229. Springer, (2001)Improved Efficiency for Private Stable Matching., , and . IACR Cryptology ePrint Archive, (2006)3DPIN: Enhancing security with 3D display., , and . GCCE, page 129-130. IEEE, (2014)Distribution chain security., and . ACM Conference on Computer and Communications Security, page 63-70. ACM, (2000)