Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Verification of Test Coverage Claims., and . ESEC / SIGSOFT FSE, volume 1301 of Lecture Notes in Computer Science, page 395-413. Springer, (1997)Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling., and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 31-43. Springer, (2005)Authentic Third-party Data Publication., , , and . DBSec, volume 201 of IFIP Conference Proceedings, page 101-112. Kluwer, (2000)Research Directions for Automated Software Verification: Using Trusted Hardware., and . ASE, page 274-279. IEEE Computer Society, (1997)Authentic Attributes with Fine-Grained Anonymity Protection., and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 276-294. Springer, (2000)Certifying Data from Multiple Sources., , and . DBSec, volume 142 of IFIP, page 47-60. Kluwer/Springer, (2003)Path Independence for Authentication in Large-Scale Systems., and . ACM Conference on Computer and Communications Security, page 57-66. ACM, (1997)An Authentication Logic Supporting Synchronization, Revocation, and Recency., and . ACM Conference on Computer and Communications Security, page 95-105. ACM, (1996)A Formal Privacy System and Its Application to Location Based Services., , and . Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, page 256-282. Springer, (2004)Stack and Queue Integrity on Hostile Platforms., and . S&P, page 198-206. IEEE Computer Society, (1998)