Search results for: Alessandro Sorniotti
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Cryptographic Protocol > 274-299
Computer Communications > 2016 > 82 > C > 71-82
Lecture Notes in Computer Science > Information and Communications Security > Session 2A. Authentication > 218-234
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Session 2: Privacy Preserving Techniques > 61-76
IFIP — The International Federation for Information Processing > Future Challenges in Security and Privacy for Academia and Industry > Authentication > 68-79
IFIP — The International Federation for Information Processing > Emerging Challenges for Security, Privacy and Trust > Security Protocols > 330-341
Computers & Security > 2013 > 33 > Complete > 41-58
Computers & Security > 2010 > 29 > 5 > 619-627
International Journal of Wireless Information Networks > 2009 > 16 > 3 > 165-174