Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Internet Fish Construction Kit.. Comput. Networks, 29 (8-13): 1237-1248 (1997)Computation of Discrete Logarithms in Prime Fields., and . Des. Codes Cryptogr., 1 (1): 47-62 (1991)Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 104-117. Springer, (1999)Encouraging recognition of fair uses in DRM systems., and . Commun. ACM, 46 (4): 61-63 (2003)Certificate Recocation: Mechanics and Meaning., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 158-164. Springer, (1998)Fine-grained access control for GridFTP using SecPAL., , , , , , , and . GRID, page 217-225. IEEE Computer Society, (2007)Solving Large Sparse Linear Systems over Finite Fields., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 109-133. Springer, (1990)Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?, and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 327-331. Springer, (2000)New Vistas in elliptic curve cryptography., and . Inf. Secur. Tech. Rep., 11 (4): 186-192 (2006)DSig 1.0 signature labels: using PICS 1.1 labels for digital signatures., , , and . World Wide Web J., (1997)