Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation., and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 136-146. Springer, (2005)Improved Related-key Attacks on Desx and Desx+., and . Cryptologia, 32 (1): 13-22 (2008)Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES).. Inf. Process. Lett., 91 (1): 33-38 (2004)An authentication framework for peer-to-peer cloud., , , , , and . SIN, page 94-101. ACM, (2013)Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs., and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 184-191. Springer, (2004)Advanced Slide Attacks Revisited: Realigning Slide on DES.. Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 263-276. Springer, (2005)A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR., , , , and . EURASIP J. Wirel. Commun. Netw., (2012)Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud., , , , and . IEEE Trans. Dependable Secur. Comput., 11 (5): 467-479 (2014)On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards., and . ICCSA (1), volume 3480 of Lecture Notes in Computer Science, page 488-497. Springer, (2005)Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme., , , , , and . ICYCS, page 2289-2294. IEEE Computer Society, (2008)