Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions., , and . EC-Web, volume 2115 of Lecture Notes in Computer Science, page 186-195. Springer, (2001)Dynamic Multi-signatures for Secure Autonomous Agents., , and . DEXA Workshop, page 587-591. IEEE Computer Society, (2001)Parametric person identification from the EEG using computational geometry., , , and . ICECS, page 1005-1008. IEEE, (1999)Shiny happy people buying: the role of emotions on personalized e-shopping., , , and . Electron. Mark., 24 (3): 193-206 (2014)Secure linking of customers, merchants and banks in electronic commerce., , , and . Future Gener. Comput. Syst., 16 (4): 393-401 (2000)Uncoercible e-Bidding Games., , and . Electron. Commer. Res., 4 (1-2): 113-125 (2004)An Equitably Fair On-line Auction Scheme., , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 72-83. Springer, (2000)Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems., and . WEBIST (1), page 301-304. INSTICC Press, (2008)Network Security in a Telemedicine System., , and . Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 108-115. Chapman & Hall, (1996)A Novel Stochastic Approach for Modeling Random Scanning Worms., , , and . Panhellenic Conference on Informatics, page 176-179. IEEE Computer Society, (2009)