Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on the AKACP Protocol., , , , and . IACR Cryptology ePrint Archive, (2010)Analysis of Object-Oriented Numerical Libraries., and . Software Engineering Research and Practice, page 253-258. CSREA Press, (2006)Facilitating software extension with design patterns and Aspect-Oriented Programming., , and . J. Syst. Softw., 81 (10): 1725-1737 (2008)Pairing-Based Cryptography on the Internet of Things: A Feasibility Study., , , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 219-230. Springer, (2018)The concept of security and trust in electronic payments., and . Comput. Secur., 24 (1): 10-15 (2005)The economic approach of information security., and . Comput. Secur., 24 (2): 105-108 (2005)An Implementation Infrastructure for Server-Passive Timed-Release Cryptography., , , and . IAS, page 89-94. IEEE Computer Society, (2008)The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes., , and . SECRYPT, page 403-407. SciTePress, (2012)Improved Anonymous Timed-Release Encryption., , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 311-326. Springer, (2007)On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols., , , and . SECRYPT, page 222-228. INSTICC Press, (2007)