Author of the publication

Interoperation Between a Conventional PKI and an ID-Based Infrastructure.

, and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 73-85. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial: "The security perimeter".. Inf. Secur. Tech. Rep., 10 (4): 185 (2005)Client v. Server Side Protocols, Interfaces and Storage.. Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, page 63-73. Springer, (2003)An updated threat model for security ceremonies., , , and . SAC, page 1836-1843. ACM, (2013)Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited".. Inf. Secur. Tech. Rep., 11 (4): 159 (2006)Public Key Infrastructures: A research agenda.. J. Comput. Secur., 14 (5): 391-417 (2006)An adaptive threat model for security ceremonies., , , , and . Int. J. Inf. Sec., 14 (2): 103-121 (2015)Introduction., , and . Inf. Secur. Tech. Rep., 8 (3): 5 (2003)User-friendly and certificate-free grid security infrastructure., , , and . Int. J. Inf. Sec., 10 (3): 137-153 (2011)PKI Challenges: An Industry Analysis.. IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 3-16. IOS Press, (2005)Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion).. Security Protocols Workshop, volume 2467 of Lecture Notes in Computer Science, page 59-62. Springer, (2001)