Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NetVote: A Strict-Coercion Resistance Re-Voting Based Internet Voting Scheme with Linear Filtering, , , and . Mathematics, 8 (9): 1618 (2020)Leveraging Quiz-based Multiple-prize Web Tournaments for Reinforcing Routine Mathematical Skills., , , and . J. Educ. Technol. Soc., 16 (3): 28-43 (2013)An internet voting proposal towards improving usability and coercion resistance, , , and . International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), page 155--164. Springer, Cham, (2019)A taxonomy and survey of attacks on digital signatures., , , and . Comput. Secur., (2013)Using Reconfigurable Hardware Through Web Services in Distributed Applications., , , , and . FPL, volume 3203 of Lecture Notes in Computer Science, page 1110-1112. Springer, (2004)An Internet Voting Proposal Towards Improving Usability and Coercion Resistance., , , and . CISIS-ICEUTE, volume 951 of Advances in Intelligent Systems and Computing, page 155-164. Springer, (2019)Extended electronic signature policies., , , and . SIN, page 268-277. ACM, (2009)Formal Validation of OFEPSP+ with AVISPA., , and . ARSPA-WITS, volume 5511 of Lecture Notes in Computer Science, page 124-137. Springer, (2009)An optimistic fair exchange protocol based on signature policies., , and . Comput. Secur., 27 (7-8): 309-322 (2008)Information sharing models for cooperative cyber defence., , and . CyCon, page 1-28. IEEE, (2013)