Author of the publication

Constructing credential-based E-voting systems from offline E-coin protocols.

, , and . J. Netw. Comput. Appl., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 185-198. Springer, (2007)Secure and scalable many-to-one symbol transmission for sensor networks., , and . Comput. Commun., 31 (10): 2408-2413 (2008)Iterated endorsement deduction and ranking., and . Computing, 99 (5): 431-446 (2017)Collusion-secure and cost-effective detection of unlawful multimedia redistribution., and . IEEE Trans. Syst. Man Cybern. Part C, 33 (3): 382-389 (2003)Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks., , , and . IEEE Trans. Veh. Technol., 58 (4): 1876-1886 (2009)A Privacy-Preserving Pay-by-Phone Parking System., , and . IEEE Trans. Vehicular Technology, 66 (7): 5697-5706 (2017)Asynchronous Large-Scale Certification Based on Certificate Verification Trees., , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)Synthetic Generation of Social Network Data With Endorsements., and . CoRR, (2014)MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services., , and . CARDIS, page 125-134. USENIX, (2002)Efficient multivariate data-oriented microaggregation., , , and . VLDB J., 15 (4): 355-369 (2006)