Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?, and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 451-463. Springer, (2017)A Theory of Secure and Efficient Implementation of Electronic Money., , and . SN Comput. Sci., 4 (6): 861 (November 2023)Towards a Foundation of Web3., , , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 3-18. Springer, (2022)A Self-Timed Implementation of Boolean Functions., and . ASYNC, page 243-. IEEE Computer Society, (1999)Secure and Efficient Implementation of Electronic Money., , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 34-51. Springer, (2022)On Provably Secure Time-Stamping Schemes., and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 500-514. Springer, (2004)Improving the Availability of Time-Stamping Services., , , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 360-375. Springer, (2001)An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation., , , , , , , , , and 1 other author(s). IEEE Access, (2022)Verification of Parameterized Asynchronous Circuits: A Case Study., , and . ACSD, page 64-74. IEEE Computer Society, (1998)