Author of the publication

A Mobile and Reliable Anonymous ePoll Infrastructure.

, , , , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 41-52. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Vickrey Auctions without a Trusted Third Party., , and . SEC, volume 250 of IFIP Conference Proceedings, page 337-348. Kluwer, (2003)On Securely Scheduling a Meeting., , , , , and . SEC, volume 193 of IFIP Conference Proceedings, page 183-198. Kluwer, (2001)Privacy Preserving Mechanisms for a Pervasive eHealth System., , , and . PrimeLife, volume 375 of IFIP Advances in Information and Communication Technology, page 221-231. Springer, (2011)Flexible and Time-Based Anonymous Access Restrictions., and . ICETE (Selected Papers), volume 130 of Communications in Computer and Information Science, page 237-250. Springer, (2009)Securing RMI Communication., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 93-105. Kluwer, (2001)Security Through Aspect-Oriented Programming., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 125-138. Kluwer, (2001)Privacy in Commercial Medical Storage Systems., , and . eHealth, volume 69 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 247-258. Springer, (2010)Assessment of Palm OS Susceptibility to Malicious Code Threats., , , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 240-249. Springer, (2005)A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning., , , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 163-170. Springer, (2011)Attribute-Based Privacy-Friendly Access Control with Context., and . ICETE (Selected Papers), volume 764 of Communications in Computer and Information Science, page 291-315. Springer, (2016)