Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RFID-Tags for Anti-counterfeiting., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 115-131. Springer, (2006)Quantum information theoretical analysis of various constructions for quantum secret sharing., , and . ISIT, page 1598-1602. IEEE, (2005)Client-Server Trade-Offs in Secure Computation., and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Private Person Authentication in an Ambient World., and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Hardware Intrinsic Security.. RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 123. Springer, (2010)Visual Crypto Displays Enabling Secure Communications., , , , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 271-284. Springer, (2003)Practical Biometric Authentication with Template Protection., , , , , and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 436-446. Springer, (2005)Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method., , , , and . ISIT, page 499-503. IEEE, (2006)Efficient Binary Conversion for Paillier Encrypted Values., and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 522-537. Springer, (2006)Key extraction from general non-discrete signals., , , , and . IACR Cryptology ePrint Archive, (2009)