Author of the publication

Mitigating the Untrusted Terminal Problem Using Conditional Signatures.

, , and . ITCC (1), page 12-16. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cora: correlation-based resilient aggregation in sensor networks., and . MSWiM, page 373-376. ACM, (2007)RANBAR: RANSAC-based resilient aggregation in sensor networks., , and . SASN, page 83-90. ACM, (2006)Code sequences for frequency-hopping multiple-access systems.. IEEE Trans. Commun., 43 (10): 2553-2554 (1995)Analysis of protocol sequences for slow frequency hopping., and . Wireless Networks, 4 (5): 411-418 (1998)Privacy Protecting Protocols for Revocable Digital Signatures., , and . CARDIS, volume 153 of IFIP, page 67-81. Kluwer/Springer, (2004)Constructions of protocol sequences for multiple access collision channel without feedback., and . IEEE Trans. Inf. Theory, 39 (5): 1762-1765 (1993)On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs., , and . ESAS, volume 4572 of Lecture Notes in Computer Science, page 129-141. Springer, (2007)Growth Optimal Investment with Transaction Costs., and . ALT, volume 5254 of Lecture Notes in Computer Science, page 108-122. Springer, (2008)Optimal Key-Trees for Tree-Based Private Authentication., , and . Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, page 332-350. Springer, (2006)Group-Based Private Authentication., , , and . WOWMOM, page 1-6. IEEE Computer Society, (2007)