Author of the publication

Secure Vickrey Auctions without Threshold Trust.

, , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 87-101. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TWOPRIME: A Fast Stream Ciphering Algorithm., , , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 88-102. Springer, (1997)Maximal Dense Intervals of Grammar Forms.. ICALP, volume 317 of Lecture Notes in Computer Science, page 424-438. Springer, (1988)Issues with Applying Cryptography in Wireless Systems.. Theory Is Forever, volume 3113 of Lecture Notes in Computer Science, page 205-215. Springer, (2004)Parental Control with Edge Computing and 5G Networks., , and . FRUCT, page 290-300. IEEE, (2021)Distributed Usage Control., , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 562-569. Elsevier, (2011)A Research Model for Trustworthy Pervasive Social Networking., , , and . TrustCom/ISPA/IUCC, page 1522-1527. IEEE Computer Society, (2013)Exploring Trust of Mobile Applications Based on User Behaviors., , , and . INTRUST, volume 6163 of Lecture Notes in Computer Science, page 212-226. Springer, (2009)Evaluating the performance and privacy of a token-based collaborative recommender., and . WI, page 1049-1053. ACM, (2017)Privacy-Preserving Peer Discovery for Group Management in p2p Networks., , and . FRUCT, page 150-156. IEEE, (2020)Extended Model of Side-Information in Garbling., , and . TrustCom/BigDataSE/ISPA (1), page 950-957. IEEE, (2015)