Author of the publication

Digital Signatures for e-Government - A Long-Term Security Architecture.

, , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 256-270. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Protocol for Trusted Spontaneous Communication., , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 228-242. Springer, (2014)Digital Signatures for e-Government - A Long-Term Security Architecture., , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 256-270. Springer, (2010)Droppix: Towards More Realistic Video Fingerprinting., , and . ICETE (2), page 468-476. ScitePress, (2020)Self-keying Identification Mechanism for Small Devices., , , and . STA, volume 186 of Communications in Computer and Information Science, page 37-44. Springer, (2011)Ghost Train for Anonymous Communication., , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 224-239. (2016)RFID Batch Authentication - A Usable Scheme Providing Anonymity., , , , and . IEEE Access, (2022)Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress., , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 173-188. Springer, (2010)Security Issues of Electronic and Mobile Banking., , and . SECRYPT, page 631-638. SCITEPRESS, (2021)Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems., , , and . CyberC, page 89-96. IEEE Computer Society, (2013)Privacy-Aware Identity Management., and . Encyclopedia of Big Data Technologies, Springer, (2019)