Author of the publication

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.

, , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 177-192. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Evolutions and Stationary Waves for perturbed KdV equation with Nonlocal Term., and . Int. J. Bifurc. Chaos, 12 (11): 2393-2407 (2002)Security Remarks on a Convertible Nominative Signature Scheme., and . SEC, volume 232 of IFIP, page 265-275. Springer, (2007)Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce., and . ICC, page 1503-1508. IEEE, (2007)Collusion attack on a multi-key secure video proxy scheme., and . ACM Multimedia, page 380-383. ACM, (2004)Correction, Optimisation and Secure and Efficient Application of PBD Shuffling., and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 425-437. Springer, (2008)Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity., and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 52-61. Springer, (2010)Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.. ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 417-429. Springer, (2004)Broadcasting in Star Graphs with Byzantine Failures., , , and . ASIAN, volume 1179 of Lecture Notes in Computer Science, page 162-171. Springer, (1996)Formal and Precise Analysis of Soundness of Several Shuffling Schemes., and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 133-143. Springer, (2010)Augmented Oblivious Polynomial Evaluation Protocol and Its Applications., and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 222-230. Springer, (2005)