Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient tracing of failed nodes in sensor networks., , and . WSNA, page 122-130. ACM, (2002)Practical Uses of Virtual Machines for Protection of Sensitive User Data., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 145-161. Springer, (2007)In Search of Usable Security: Five Lessons from the Field., , , and . IEEE Secur. Priv., 2 (5): 19-24 (2004)Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.. Encyclopedia of Cryptography and Security, Springer, (2005)Secret Handshakes from Pairing-Based Key Agreements., , , , , and . S&P, page 180-196. IEEE Computer Society, (2003)Securing a Remote Terminal Application with a Mobile Trusted Device., , , and . ACSAC, page 438-447. IEEE Computer Society, (2004)Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments., , , , and . UbiComp, volume 4206 of Lecture Notes in Computer Science, page 477-494. Springer, (2006)Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 14-29. Springer, (2000)Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC., and . USENIX Security Symposium, USENIX Association, (2003)Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute., , , , and . USENIX Security Symposium, page 207-222. USENIX, (2004)