Author of the publication

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.

, , , , , and . Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 94-104. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganography Using Modern Arts., and . IFIP TCS, volume 1872 of Lecture Notes in Computer Science, page 140-151. Springer, (2000)The Key Establishment Problem., and . FOSAD, volume 2946 of Lecture Notes in Computer Science, page 44-90. Springer, (2002)A flaw in a self-healing key distribution scheme., , and . ITW, page 163-166. IEEE, (2003)Dynamic Multi-threshold Metering Schemes., , , and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 130-143. Springer, (2000)A Bluetooth-Based JXME Infrastructure., and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 667-682. Springer, (2007)Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution., , and . Theor. Comput. Sci., 200 (1-2): 313-334 (1998)A Novel Approach to Proactive Password Checking., , , and . InfraSec, volume 2437 of Lecture Notes in Computer Science, page 30-39. Springer, (2002)Randomness in Distributed Protocols., , and . ICALP, volume 820 of Lecture Notes in Computer Science, page 568-579. Springer, (1994)A Lightweight Framework forWeb Services Invocation over Bluetooth., , , and . ICWS, page 331-338. IEEE Computer Society, (2006)Efficient Sharing of Many Secrets., , and . STACS, volume 665 of Lecture Notes in Computer Science, page 692-703. Springer, (1993)