Author of the publication

Linkability in Practical Electronic Cash Design.

, , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Implementation of the Yao Forward Integrity Protocol for Mobile Agents., , and . Cryptographic Algorithms and their Uses, page 110-124. Queensland University of Technology, (2004)Improving performance of intrusion detection system using ensemble methods and feature selection., , , , and . ACSW, page 2:1-2:6. ACM, (2018)A two-pass approach for minimising error in synthetically generated network traffic data sets., , , , and . ACSW, page 18-27. ACM, (2023)Two-stage Unsupervised Approach for Combating Social Spammers., , and . SSCI, page 71-78. IEEE, (2020)A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA., , , , and . S-CUBE, volume 24 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 66-82. Springer, (2009)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence., , , and . ICST, page 1-6. IEEE, (2023)A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning., , , and . ICFEM, volume 14308 of Lecture Notes in Computer Science, page 273-278. Springer, (2023)Ubiquitous Authorization Scheme Based on Device Profile., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 312-321. Springer, (2006)Linkability in Practical Electronic Cash Design., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)