Author of the publication

Protocols with Security Proofs for Mobile Applications.

, , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 358-369. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Framework for User Privacy in Heterogeneous Location Networks., , , , and . MATA, volume 3284 of Lecture Notes in Computer Science, page 264-274. Springer, (2004)A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation., , , and . Cryptographic Algorithms and their Uses, page 125-139. Queensland University of Technology, (2004)Protocols with Security Proofs for Mobile Applications., , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 358-369. Springer, (2004)Distributed Management of OMA DRM Domains., , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 237-251. Springer, (2006)A user-centric anonymous authorisation framework in e-commerce environment., , , and . ICEC, volume 60 of ACM International Conference Proceeding Series, page 138-147. ACM, (2004)