Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Falcon Codes: Fast, Authenticated LT Codes., , , and . IACR Cryptology ePrint Archive, (2014)RFID security and privacy: long-term research or short-term tinkering?, , , , , , and . WISEC, page 160. ACM, (2008)Coercion-resistant electronic elections., , and . WPES, page 61-70. ACM, (2005)X-Cash: Executable Digital Cash., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 16-27. Springer, (1998)A Fuzzy Commitment Scheme., and . ACM Conference on Computer and Communications Security, page 28-36. ACM, (1999)Minimalist Cryptography for Low-Cost RFID Tags.. SCN, volume 3352 of Lecture Notes in Computer Science, page 149-164. Springer, (2004)A Clean-Slate Look at Disk Scrubbing., and . FAST, page 57-70. USENIX, (2010)Parallel mixing., and . CCS, page 220-226. ACM, (2004)Funkspiel schemes: an alternative to conventional tamper resistance., , , and . ACM Conference on Computer and Communications Security, page 125-133. ACM, (2000)Tailing RFID Tags for Clone Detection., , and . NDSS, The Internet Society, (2013)