Author of the publication

An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.

, , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 82-96. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection of Data and Delegated Keys in Digital Distribution., , and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 271-282. Springer, (1997)Proxy Signatures for Delegating Signing Operation., , and . ACM Conference on Computer and Communications Security, page 48-57. ACM, (1996)Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks., , , , , and . Secur. Commun. Networks, 1 (2): 179-189 (2008)Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN., , and . MSN, page 622-627. IEEE, (2021)Problems on the MR micropayment schemes., , , and . AsiaCCS, page 363. ACM, (2006)Privacy Risk Evaluation of Re-Identification of Pseudonyms., , , and . AsiaJCIS, page 165-172. IEEE, (2019)Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation., , , , and . AsiaCCS, page 423-436. ACM, (2022)Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation., , , , and . IACR Cryptol. ePrint Arch., (2021)Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs., , , , and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 32-48. Springer, (2015)A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power., , , , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 297-311. Springer, (2007)