Author of the publication

The Challenges Raised by the Privacy-Preserving Identity Card.

, and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 383-404. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Tolerance in Distributed Computing Systems., , and . S&P, page 110-121. IEEE Computer Society, (1991)Tolerance of Design Faults., , , and . Dependable and Historic Computing, volume 6875 of Lecture Notes in Computer Science, page 428-452. Springer, (2011)Efficient Remote Data Possession Checking in Critical Information Infrastructures., , , , and . IEEE Trans. Knowl. Data Eng., 20 (8): 1034-1038 (2008)The CRUTIAL Architecture for Critical Information Infrastructures., , , , , , and . WADS, volume 5135 of Lecture Notes in Computer Science, page 1-27. Springer, (2007)Critical Infrastructures Security Modeling, Enforcement and Runtime Checking., and . CRITIS, volume 5508 of Lecture Notes in Computer Science, page 95-108. Springer, (2008)An Intrusion-Tolerant Security Server for an Open Distributed System., and . ESORICS, page 97-104. AFCET, (1990)Smartcard-based Anonymization., , , and . CARDIS, volume 153 of IFIP, page 49-66. Kluwer/Springer, (2004)Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach., , and . EDCC, volume 852 of Lecture Notes in Computer Science, page 21-38. Springer, (1994)Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering., , and . S&P, page 194-203. IEEE Computer Society, (1986)Organization based access contro., , , , , , , , and . POLICY, page 120-. IEEE Computer Society, (2003)