From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sicherheit und Kryptographie im Internet. Von sicherer E-Mail bis zu IP-Verschlüsselung. Vieweg, (2005)How to Security Broadcast a Secret.. Communications and Multimedia Security, том 152 из IFIP Conference Proceedings, стр. 247-257. Kluwer, (1999)Breaking and Fixing Gridcoin., , , и . WOOT, USENIX Association, (2017)We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets., , , , , , и . USENIX Security Symposium, стр. 4877-4894. USENIX Association, (2023)Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures., , , , и . USENIX Security Symposium, стр. 7411-7428. USENIX Association, (2023)The power of recognition: secure single sign-on using TLS channel bindings., , и . Digital Identity Management, стр. 63-72. ACM, (2011)A New RSA-Based Signature Scheme., и . AFRICACRYPT, том 6055 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2010)A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys., и . Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 129-142. Springer, (2010)Out of the Dark: UI Redressing and Trustworthy Events., и . CANS, том 11261 из Lecture Notes in Computer Science, стр. 229-249. Springer, (2017)Sicherheitsanalyse von Kreditkarten am Beispiel von EMV., , и . GI Jahrestagung, том P-154 из LNI, стр. 1732-1743. GI, (2009)