Author of the publication

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.

, , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 177-192. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Fast Handover Authentication Scheme in Mobile Networks., , , and . ICC, page 1-5. IEEE, (2009)Towards Lightweight Anonymous Entity Authentication for IoT Applications., , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 265-280. Springer, (2016)A Privacy Preserving Rental System., and . ISC, volume 3650 of Lecture Notes in Computer Science, page 59-73. Springer, (2005)Practical private data matching deterrent to spoofing attacks., , and . CIKM, page 852-853. ACM, (2006)Security Analysis and Improvement of the Global Key Recovery System., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 17-24. Springer, (2002)Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 127-144. Springer, (2017)Modeling TCG-Based Secure Systems with Colored Petri Nets., , , , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 67-86. Springer, (2010)Privacy and Ownership Preserving of Outsourced Medical Data., , , and . ICDE, page 521-532. IEEE Computer Society, (2005)Multiuser private queries over encrypted databases., , , and . Int. J. Appl. Cryptogr., 1 (4): 309-319 (2009)On Lightweight Security Enforcement in Cyber-Physical Systems., , , and . LightSec, volume 9542 of Lecture Notes in Computer Science, page 97-112. Springer, (2015)