Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Model for Public-Key Authentication., , and . KiVS, page 213-224. Springer, (2007)Receipt-free remote electronic elections with everlasting privacy., and . Ann. des Télécommunications, 71 (7-8): 323-336 (2016)A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System., and . ISSA, ISSA, Pretoria, South Africa, (2010)Are alternatives to Dempster's rule of combination real alternatives?: Comments on Äbout the belief function combination and the conflict management problem" - Lefevre et al.. Inf. Fusion, 3 (3): 237-239 (2002)Logical Compilation of Bayesian Networks with Discrete Variables., and . ECSQARU, volume 4724 of Lecture Notes in Computer Science, page 536-547. Springer, (2007)Attacking the Verification Code Mechanism in the Norwegian Internet Voting System., , and . VoteID, volume 7985 of Lecture Notes in Computer Science, page 76-92. Springer, (2013)Special Issue of Minds and Machines on Causality, Uncertainty and Ignorance., and . Minds and Machines, 16 (3): 237-238 (2006)Outsourcing Modular Exponentiation in Cryptographic Web Applications., and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 181-195. Springer, (2018)Towards a Unifying Theory of Logical and Probabilistic Reasoning.. ISIPTA, page 193-202. SIPTA, (2005)Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes., , and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 116-127. Springer, (2011)