Author of the publication

ID-based Secure PIM-SM Schemes.

, , and . Wireless and Optical Communications, page 190-195. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fair Electronic Cash Scheme., , and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 20-32. Springer, (2001)Robust and Secure Broadcasting., and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 223-231. Springer, (2001)An Authorization Architecture for Web Services., and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 222-236. Springer, (2005)An Authorization Model for E-consent Requirement in a Health Care Application., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 191-205. Springer, (2003)Decentralized Temporal Authorization Administration., and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 917-926. Springer, (2003)A language for specifying sequences of authorization transformations and its applications., and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 39-49. Springer, (1997)Logic-Based Reasoning on Delegatable Authorizations., , and . ISMIS, volume 2366 of Lecture Notes in Computer Science, page 185-193. Springer, (2002)Authorization in Object Oriented Databases., and . ACISP, volume 1587 of Lecture Notes in Computer Science, page 270-280. Springer, (1999)Security Issues in Asynchronous Transfer Mode., , and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 76-89. Springer, (1997)On the Applicability of Trusted Computing in Distributed Authorization Using Web Services., , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 222-237. Springer, (2008)