Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technologies for controlled anonymity, , , , , , , , , and 1 other author(s). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks., and . SPC, volume 3450 of Lecture Notes in Computer Science, page 86-100. Springer, (2005)The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks., and . ICDCS Workshops, page 916-922. IEEE Computer Society, (2005)Power consumption evaluation of efficient digital signature schemes for low power devices., and . WiMob (1), page 79-86. IEEE, (2005)Privacy-Preserving ECC-Based Grouping Proofs for RFID., , , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 159-165. Springer, (2010)ARM: anonymous routing protocol for mobile ad hoc networks., and . Int. J. Wirel. Mob. Comput., 3 (3): 145-155 (2009)Hierarchical ECC-Based RFID Authentication Protocol., , , and . RFIDSec, volume 7055 of Lecture Notes in Computer Science, page 183-201. Springer, (2011)Towards Measuring Anonymity., , , and . Privacy Enhancing Technologies, volume 2482 of Lecture Notes in Computer Science, page 54-68. Springer, (2002)User Privacy in RFID Networks., and . ISSE, page 206-215. Vieweg+Teubner, (2009)The security of mass transport ticketing systems., , and . ISSE, page 347-356. Vieweg+Teubner, (2008)