Author of the publication

How to Bypass Two Anonymity Revocation Schemes.

, and . Privacy Enhancing Technologies, volume 5134 of Lecture Notes in Computer Science, page 187-201. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Bypass Two Anonymity Revocation Schemes., and . Privacy Enhancing Technologies, volume 5134 of Lecture Notes in Computer Science, page 187-201. Springer, (2008)Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model., , and . UPSEC, USENIX Association, (2008)A Patch for Postel's Robustness Principle., , and . IEEE Secur. Priv., 10 (2): 87-91 (2012)Security Applications of Formal Language Theory., , , and . IEEE Syst. J., 7 (3): 489-500 (2013)The Promise of Privacy.. LISA, USENIX, (2002)PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure., , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 289-303. Springer, (2010)Heartbeat traffic to counter (n-1) attacks: red-green-black mixes., and . WPES, page 89-93. ACM, (2003)Comparison Between Two Practical Mix Designs., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 141-159. Springer, (2004)The pynchon gate: a secure method of pseudonymous mail retrieval., , and . WPES, page 1-9. ACM, (2005)The Halting Problems of Network Stack Insecurity., , , and . login Usenix Mag., (2011)