Author of the publication

Securing on-line credit card payments without disclosing privacy information.

, , and . Comput. Stand. Interfaces, 25 (2): 119-129 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing on-line credit card payments without disclosing privacy information., , and . Comput. Stand. Interfaces, 25 (2): 119-129 (2003)Cryptanalysis on Schwartz Graphical Encryption Method., , and . Cryptologia, 17 (3): 301-304 (1993)ID-Based Structured Mulitsignature Schemes., , and . Network Security, volume 206 of IFIP Conference Proceedings, page 45-59. Kluwer, (2001)Controlling Decryption of Personal Health Records in the Cloud., and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 69-79. Springer, (2011)Classifying Video Documents by Hierarchical Structure of Video Contents., , and . Comput. J., 43 (5): 396-410 (2000)Online Gaming Cheating and Security Issue., , , , and . ITCC (1), page 518-523. IEEE Computer Society, (2005)Rules Markup for Automatic Deployment of Information Security Policies., and . ISAS-SCI (1), page 44-49. IIIS, (2001)Establishing Chain of Evidence as a Base for Non-Repudiation Services., , and . SEC, volume 250 of IFIP Conference Proceedings, page 49-60. Kluwer, (2003)A transactional-cycle approach to evidence management for dispute resolution., , and . Inf. Manag., 42 (4): 607-618 (2005)An analysis of online gaming crime characteristics., , , , , and . Internet Res., 15 (3): 246-261 (2005)