Author of the publication

Untransferable Rights in a Client-Independent Server Environment.

. EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 260-266. Springer, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handbook on Statistical Disclosure Control (Version 1.1). ESSNET SDC Project, , , , , , , , and . (2009)Weighted network decapitation: the economics of iterated attack and defense.. CIKM-PAVLAD, page 33-36. ACM, (2009)Big Data Anonymization Requirements vs Privacy Models.. ICETE (2), page 471-478. SciTePress, (2018)Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics., , , , , and . CoRR, (2015)Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation., and . Data Min. Knowl. Discov., 11 (2): 195-212 (2005)k-Anonymity. Encyclopedia of Database Systems, Springer US, (2009)Efficient Remote Data Possession Checking in Critical Information Infrastructures., , , , and . IEEE Trans. Knowl. Data Eng., 20 (8): 1034-1038 (2008)Software Run-Time Protection: A Cryptographic Issue.. EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 474-480. Springer, (1990)Practical Data-Oriented Microaggregation for Statistical Disclosure Control., and . IEEE Trans. Knowl. Data Eng., 14 (1): 189-201 (2002)Validating Distance-Based Record Linkage with Probabilistic Record Linkage., and . CCIA, volume 2504 of Lecture Notes in Computer Science, page 207-215. Springer, (2002)