Author of the publication

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.

, , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 679-696. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking., , , and . Security and Management, page 179-183. CSREA Press, (2009)Unsuccessful Search in Self-Adjusting Data Structures., and . J. Algorithms, 15 (3): 447-481 (1993)MLAS: multiple level authentication scheme for VANETs., , , and . AsiaCCS, page 471-475. ACM, (2011)UFLE: a user-friendly location-free encryption system for mobile users., , , and . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)Integrating Different Signature Purposes in Workflow Systems - A Case Study., , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 360-366. Springer, (1999)WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps., , , , , and . WISEC, page 25:1-25:12. ACM, (2015)Dynamic Software Birthmark for Java Based on Heap Memory Analysis., , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 94-107. Springer, (2011)Authenticated Directed Diffusion., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 366-377. Springer, (2008)A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities., , , , and . Pervasive Mob. Comput., (2017)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)