Author of the publication

Why Cryptosystems Fail.

. ACM Conference on Computer and Communications Security, page 215-227. (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Keys under doormats., , , , , , , , , and 5 other author(s). Commun. ACM, 58 (10): 24-26 (2015)Cryptography and competition policy: issues with 'trusted computing'.. PODC, page 3-10. ACM, (2003)Sybil-Resistant DHT Routing., , , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 305-318. Springer, (2005)Do You Believe in Tinker Bell? The Social Externalities of Trust., and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 224-236. Springer, (2015)The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion).. Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, page 239-245. Springer, (2004)It's the Anthropology, Stupid!, and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 127-130. Springer, (2010)Automatic Bill of Materials., and . CoRR, (2023)It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud., and . IEEE Secur. Priv., 13 (5): 99-103 (2015)Information hiding-a survey., , and . Proc. IEEE, 87 (7): 1062-1078 (1999)