Author of the publication

Cryptographic Security of Individual Instances.

, , , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 195-210. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deepening the Demographic Mechanisms in a Data-Driven Social Simulation of Moral Values Evolution., , and . MABS, volume 5269 of Lecture Notes in Computer Science, page 167-182. Springer, (2008)Mentat: A Data-Driven Agent-Based Simulation of Social Values Evolution., , and . MABS, volume 5683 of Lecture Notes in Computer Science, page 135-146. Springer, (2009)Decisions Based upon Multiple Values: The BVG Agent Architecture., and . EPIA, volume 1695 of Lecture Notes in Computer Science, page 297-311. Springer, (1999)A data-driven simulation of social values evolution., , and . AAMAS (2), page 1337-1338. IFAAMAS, (2009)Evaluation of a Teleradiology System - Impact and User Satisfaction., , and . HEALTHINF, page 295-302. SciTePress, (2011)The Supply Chain Network Integration., and . PAAMS (Workshops), volume 1047 of Communications in Computer and Information Science, page 39-49. Springer, (2019)Context Switching versus Context Permeability in Multiple Social Networks., , , , and . EPIA, volume 5816 of Lecture Notes in Computer Science, page 547-559. Springer, (2009)What We Do: Challenges in Individual Rationality and Its Collective Consequences.. ICAART (1), page 11. SciTePress, (2018)Automated Privacy-Preserving Techniques via Meta-Learning., , and . CoRR, (2024)Towards a Modular On-Premise Approach for Data Sharing., , , , and . Sensors, 21 (17): 5805 (2021)