Author of the publication

A Secure Submission System for Online Whistleblowing Platforms.

, , , , and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 354-361. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept., , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 343-357. Springer, (2004)A Safe Update Mechanism for Smart Cards., and . POST, volume 9036 of Lecture Notes in Computer Science, page 239-258. Springer, (2015)Estimating Causal Effects With Partial Covariates For Clinical Interpretability., , and . CoRR, (2018)PLC Guard: A practical defense against attacks on cyber-physical systems., , , , and . CNS, page 326-334. IEEE, (2015)On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection.. Mobile Agents, volume 2240 of Lecture Notes in Computer Science, page 1-14. Springer, (2001)Invexity Preserving Transformations for Projection Free Optimization with Sparsity Inducing Non-convex Constraints., , and . GCPR, volume 11269 of Lecture Notes in Computer Science, page 682-697. Springer, (2018)Encrypting Java Archives and Its Application to Mobile Agent Security., and . AgentLink, volume 1991 of Lecture Notes in Computer Science, page 229-239. Springer, (2001)Deep Archetypal Analysis., , , and . GCPR, volume 11824 of Lecture Notes in Computer Science, page 171-185. Springer, (2019)Simple and effective defense against evil twin access points., , , and . WISEC, page 220-235. ACM, (2008)How Badly Do You Want Privacy?, and . IEEE Internet Comput., 19 (2): 92-94 (2015)