Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 104-117. Springer, (1999)Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?, and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 327-331. Springer, (2000)Fine-grained access control for GridFTP using SecPAL., , , , , , , and . GRID, page 217-225. IEEE Computer Society, (2007)Certificate Recocation: Mechanics and Meaning., and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 158-164. Springer, (1998)Solving Large Sparse Linear Systems over Finite Fields., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 109-133. Springer, (1990)The long road ahead to transition to post-quantum cryptography.. Commun. ACM, 65 (1): 28-30 (2022)Computation of Discrete Logarithms in Prime Fields (Extended Abstract)., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 616-618. Springer, (1990)Key Challenges in DRM: An Industry Perspective.. Digital Rights Management Workshop, volume 2696 of Lecture Notes in Computer Science, page 51-60. Springer, (2002)Spam!, and . Commun. ACM, 41 (8): 74-83 (1998)Internet fish.. Massachusetts Institute of Technology, Cambridge, MA, USA, (1996)ndltd.org (oai:dspace.mit.edu:1721.1/11049).