Author of the publication

Outsourcing Modular Exponentiation in Cryptographic Web Applications.

, and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 181-195. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Model for Public-Key Authentication., , and . KiVS, page 213-224. Springer, (2007)Special Issue of Minds and Machines on Causality, Uncertainty and Ignorance., and . Minds and Machines, 16 (3): 237-238 (2006)Logical Compilation of Bayesian Networks with Discrete Variables., and . ECSQARU, volume 4724 of Lecture Notes in Computer Science, page 536-547. Springer, (2007)A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System., and . ISSA, ISSA, Pretoria, South Africa, (2010)Attacking the Verification Code Mechanism in the Norwegian Internet Voting System., , and . VoteID, volume 7985 of Lecture Notes in Computer Science, page 76-92. Springer, (2013)Receipt-free remote electronic elections with everlasting privacy., and . Ann. des Télécommunications, 71 (7-8): 323-336 (2016)Outsourcing Modular Exponentiation in Cryptographic Web Applications., and . Financial Cryptography Workshops, volume 10958 of Lecture Notes in Computer Science, page 181-195. Springer, (2018)Credential Networks: a General Model for Distributed Trust and Authenticity Management., and . PST, (2005)Propositional Information Systems., , and . J. Log. Comput., 9 (5): 651-681 (1999)ABEL: An Interactive Tool for Probabilistic Argumentative Reasoning., and . ECSQARU, volume 2711 of Lecture Notes in Computer Science, page 588-593. Springer, (2003)