Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path Independence for Authentication in Large-Scale Systems., and . ACM Conference on Computer and Communications Security, page 57-66. ACM, (1997)Certifying Data from Multiple Sources., , and . DBSec, volume 142 of IFIP, page 47-60. Kluwer/Springer, (2003)An Authentication Logic Supporting Synchronization, Revocation, and Recency., and . ACM Conference on Computer and Communications Security, page 95-105. ACM, (1996)Authentic Attributes with Fine-Grained Anonymity Protection., and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 276-294. Springer, (2000)On countering online dictionary attacks with login histories and humans-in-the-loop., and . ACM Trans. Inf. Syst. Secur., 9 (3): 235-258 (2006)Stack and Queue Integrity on Hostile Platforms., and . S&P, page 198-206. IEEE Computer Society, (1998)A Formal Privacy System and Its Application to Location Based Services., , and . Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, page 256-282. Springer, (2004)Temporarily hidden bit commitment and lottery applications., , and . Int. J. Inf. Sec., 9 (1): 33-50 (2010)Stack and Queue Integrity on Hostile Platforms., and . IEEE Trans. Software Eng., 28 (1): 100-108 (2002)Publicly Verifiable Lotteries: Applications of Delaying Functions., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 214-226. Springer, (1998)