Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Issuer-free oblivious transfer with access control revisited.. Inf. Process. Lett., (2017)Using Selene to Verify Your Vote in JCJ., , , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 385-403. Springer, (2017)Unlinkable Updatable Databases and Oblivious Transfer with Access Control., and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 584-604. Springer, (2020)Universally Composable Adaptive Priced Oblivious Transfer., , and . Pairing, volume 5671 of Lecture Notes in Computer Science, page 231-247. Springer, (2009)Optimally private access control., and . WPES, page 37-48. ACM, (2013)(Universal) Unconditional Verifiability in E-Voting without Trusted Parties., , , , and . IACR Cryptology ePrint Archive, (2016)Private Mobile Pay-TV From Priced Oblivious Transfer., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (2): 280-291 (2018)UC Updatable Databases and Applications., and . AFRICACRYPT, volume 12174 of Lecture Notes in Computer Science, page 66-87. Springer, (2020)A conditional access system with revocation for mobile pay-TV systems revisited.. Inf. Process. Lett., (2019)Privacy-preserving smart metering., and . WPES, page 49-60. ACM, (2011)