Author of the publication

Anonymity without 'Cryptography'.

, and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 108-126. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanisms for a spatially distributed market., , and . EC, page 9-20. ACM, (2004)Anonymity without 'Cryptography'., and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 108-126. Springer, (2001)E-Voting Without 'Cryptography'., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 1-15. Springer, (2002)An Efficient PAC Algorithm for Reconstructing a Mixture of Lines., , and . ALT, volume 2533 of Lecture Notes in Computer Science, page 351-364. Springer, (2002)Towards Virtualization of On-Demand Web Service Composition Using an Improved Ranking Algorithm., , , and . International Conference on Internet Computing, page 817-823. CSREA Press, (2004)Supporting Privacy in Decentralized Additive Reputation Systems., , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 108-119. Springer, (2004)Impersonation-Based Mechanisms., , and . AAAI, page 592-597. AAAI Press, (2006)Single-value combinatorial auctions and algorithmic implementation in undominated strategies., , and . J. ACM, 56 (1): 4:1-4:32 (2009)Synfire chain in a balanced network., , , and . Neurocomputing, (2002)eye-q: eyeglass peripheral display for subtle intimate notifications., , , , and . Mobile HCI, page 211-218. ACM, (2006)