Author of the publication

Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.

, , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 98-127. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crowd Sourced approach towards Sustainability and Productivity., , , and . AMCIS, Association for Information Systems, (2018)Keyloggers in Cybersecurity Education., and . Security and Management, page 293-299. CSREA Press, (2010)What lies above: using poetic methods to interrogate user positions across GNSS infrastructures.. Queen Mary University of London, UK, (2018)British Library, EThOS.Avicaching: A Two Stage Game for Bias Reduction in Citizen Science., , , , and . AAMAS, page 776-785. ACM, (2016)What Lies Above: Alternative User Experiences Produced Through Focussing Attention on GNSS Infrastructure., , , and . Conference on Designing Interactive Systems, page 161-172. ACM, (2017)Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication., , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 98-127. Springer, (2023)Decentralized Authorization in a Database System., and . VLDB, page 352-359. IEEE Computer Society, (1979)Library of Congress Number 7987908.Q-Data: Using Deductive Database Technology to Improve Data Quality., , and . Workshop on Programming with Logic Databases (Book), ILPS, page 23-56. Kluwer, (1993)RM: A resource-sharing system for personal computers., , , , , and . SIGSMALL, page 91-98. ACM, (1983)The decoupling principle: a practical privacy framework., , , and . HotNets, page 213-220. ACM, (2022)