Author of the publication

Client-Server Trade-Offs in Secure Computation.

, and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Client-Server Trade-Offs in Secure Computation., and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Private Person Authentication in an Ambient World., and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)RFID-Tags for Anti-counterfeiting., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 115-131. Springer, (2006)Quantum information theoretical analysis of various constructions for quantum secret sharing., , and . ISIT, page 1598-1602. IEEE, (2005)Hardware Intrinsic Security.. RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 123. Springer, (2010)Visual Crypto Displays Enabling Secure Communications., , , , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 271-284. Springer, (2003)Practical Biometric Authentication with Template Protection., , , , , and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 436-446. Springer, (2005)Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method., , , , and . ISIT, page 499-503. IEEE, (2006)Key extraction from general non-discrete signals., , , , and . IACR Cryptology ePrint Archive, (2009)An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes., , , and . IACR Cryptology ePrint Archive, (2002)