Author of the publication

Extending Trust in Peer-to-Peer Networks.

, , and . ADBIS (Workshops), volume 5968 of Lecture Notes in Computer Science, page 145-152. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms., and . ACM SIGOPS Oper. Syst. Rev., 29 (4): 87-96 (1995)Why Isn't Trust Transitive?, and . Security Protocols Workshop, volume 1189 of Lecture Notes in Computer Science, page 171-176. Springer, (1996)Binding Bit Patterns to Real World Entities., and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 105-113. Springer, (1997)BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks., , , and . IEEE J. Biomed. Health Informatics, 20 (3): 763-774 (2016)Multichannel Protocols to Prevent Relay Attacks., , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 4-19. Springer, (2010)Merkle Puzzles Revisited - Finding Matching Elements Between Lists., and . Security Protocols Workshop, volume 2467 of Lecture Notes in Computer Science, page 87-90. Springer, (2001)Remodelling the Attacker (Transcript of Discussion).. Security Protocols Workshop, volume 6615 of Lecture Notes in Computer Science, page 1-2. Springer, (2008)More Security or Less Insecurity., and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 115-119. Springer, (2010)The System Likes You.. Security Protocols Workshop, volume 4631 of Lecture Notes in Computer Science, page 1-2. Springer, (2005)Panel Session - Future Directions., , , , and . Security Protocols Workshop, volume 1550 of Lecture Notes in Computer Science, page 227-239. Springer, (1998)