From post

Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals.

, и . PrimeLife, том 375 из IFIP Advances in Information and Communication Technology, стр. 261-273. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash.. SPSR-SG@CPSWeek, стр. 3-7. ACM, (2017)Optimal Routing Tables., , и . PODC, стр. 134-142. ACM, (1996)Vote to Link: Recovering from Misbehaving Anonymous Users., , и . WPES@CCS, стр. 111-122. ACM, (2016)A secure channel for attribute-based credentials: short paper., и . Digital Identity Management, стр. 13-18. ACM, (2013)Secure Method Invocation in JASON., и . CARDIS, стр. 29-40. USENIX, (2002)Mutual Search (Extended Abstract)., , , , , и . SODA, стр. 481-489. ACM/SIAM, (1998)Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals., и . PrimeLife, том 375 из IFIP Advances in Information and Communication Technology, стр. 261-273. Springer, (2011)Self-Stabilizing Ring-Orientation Using Constant Space.. Inf. Comput., 144 (1): 18-39 (1998)On Linkability and Malleability in Self-blindable Credentials., , и . WISTP, том 9311 из Lecture Notes in Computer Science, стр. 203-218. Springer, (2015)06371 Executive Summary -- From Security to Dependability., , и . From Security to Dependability, том 06371 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)