Author of the publication

Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme.

, , , , , and . SERVICES, page 121-128. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Practical Searchable Symmetric Encryption., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 151-167. Springer, (2013)How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC., , , and . Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 182-194. Springer, (2010)Leakage-Resilient RFID Authentication with Forward-Privacy., , , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 176-188. Springer, (2010)log *-Round Game-Theoretically-Fair Leader Election., , , and . CRYPTO (3), volume 13509 of Lecture Notes in Computer Science, page 409-438. Springer, (2022)Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?. INTRUST, volume 7711 of Lecture Notes in Computer Science, page 63-64. Springer, (2012)Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles., , , and . ICBC, page 1-9. IEEE, (2023)Distributed Random Number Generation Method on Smart Contracts., , and . BIOTC, page 1-10. ACM, (2022)How formal analysis and verification add security to blockchain-based systems.. FMCAD, page 1-4. IEEE, (2017)Relations among Notions of Privacy for RFID Authentication Protocols., , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 661-678. Springer, (2012)Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer., and . PODC, page 201. ACM, (2003)