Author of the publication

Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices.

, , , and . MASS, page 715-720. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monotonicity and inert fugitive search games., and . Electron. Notes Discret. Math., (1999)On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight., , , and . Optim. Lett., 10 (6): 1203-1220 (2016)A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution., , , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-79. Springer, (2011)On the Use of Weber Polynomials in Elliptic Curve Cryptography., , and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 335-349. Springer, (2004)A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs., and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 155-166. Springer, (2011)Trust in global computing systems as a limit property emerging from short range random interactions., , , and . ARES, page 741-748. IEEE Computer Society, (2007)On the Existence of Consensus Converging Organized Groups in Large Social Networks., , , and . SIROCCO, volume 14662 of Lecture Notes in Computer Science, page 507-512. Springer, (2024)Locating Information with Uncertainty in Fully Interconnected Networks., , , and . DISC, volume 1914 of Lecture Notes in Computer Science, page 283-296. Springer, (2000)Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond.. Privacy and Identity Management, volume 421 of IFIP Advances in Information and Communication Technology, page 64-76. Springer, (2013)Geometric approaches for creating low power, low interference connectivity patterns in static, structureless sensor networks., and . ISADS, page 237-242. IEEE Computer Society, (2009)