Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polymorphic Encryption and Pseudonymisation for Personalised Healthcare., , , , and . IACR Cryptology ePrint Archive, (2016)Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove.. IACR Cryptology ePrint Archive, (2016)Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals., and . EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 119-133. Springer, (1997)Fast Irreducibility and Subgroup Membership Testing in XTR., and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 73-86. Springer, (2001)Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems.. J. Cryptol., 17 (4): 277-296 (2004)Cell-based privacy-friendly roadpricing., , and . Comput. Math. Appl., 65 (5): 774-785 (2013)Privacy protection in electronic education based on polymorphic pseudonymization.. IACR Cryptology ePrint Archive, (2015)Selecting Secure Passwords.. CT-RSA, volume 4377 of Lecture Notes in Computer Science, page 49-66. Springer, (2007)The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable., , and . IACR Cryptology ePrint Archive, (2015)Activate Later Certificates for V2X - Combining ITS efficiency with privacy.. IACR Cryptology ePrint Archive, (2016)