Author of the publication

Bayesian Analysis of Secure P2P Sharing Protocols.

, , , and . OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, page 1701-1717. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of the RSA-CEGD protocol, , , and . CoRR, (2008)Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management., , , and . IET Inf. Secur., 10 (2): 60-68 (2016)A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol., , , and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1309-1318. Springer, (2005)A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma., , , and . International Conference on Internet Computing, page 37-43. CSREA Press, (2010)POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations., , , , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 224-227. Springer, (2011)L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols., , , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 108-122. Springer, (2010)Anonymous authentication for privacy-preserving IoT target-driven applications., , , and . Comput. Secur., (2013)A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs., , , and . Web Intelligence, page 682-685. IEEE Computer Society, (2010)Towards Automated Design of Multi-party Rational Exchange Security Protocols., , , and . Web Intelligence/IAT Workshops, page 387-390. IEEE Computer Society, (2007)Nature-Inspired Synthesis of Rational Protocols., , , and . PPSN, volume 5199 of Lecture Notes in Computer Science, page 981-990. Springer, (2008)