Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive Scheduling Supports for Real-Time Multimedia Execution., and . ICMCS, page 598-599. IEEE Computer Society, (1997)Post-Quantum VRF and its Applications in Future-Proof Blockchain System., , , , and . CoRR, (2021)Scheduling multimedia applications under overload and non-deterministic conditions., and . IEEE Real Time Technology and Applications Symposium, page 178-183. IEEE Computer Society, (1997)ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret., , , , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 530-550. Springer, (2023)BetterThanPin: Empowering Users to Fight Phishing (Poster).. Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 424. Springer, (2010)Layering Quantum-Resistance into Classical Digital Signature Algorithms., and . ISC, volume 13118 of Lecture Notes in Computer Science, page 26-41. Springer, (2021)Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications., and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 308-316. Springer, (2022)Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader., , and . IEEE ICBC, page 1-9. IEEE, (2020)Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries., , and . ACNS Workshops (1), volume 14586 of Lecture Notes in Computer Science, page 283-302. Springer, (2024)Post-Quantum Adversarial Modeling: A User's Perspective., , , and . Computer, 56 (8): 58-67 (August 2023)