The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tomas Sander: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew K. Franklin, Tomas Sander
    Commital Deniable Proofs and Electronic Campaign Finance. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:373-387 [Conf]
  2. Joan Feigenbaum, Michael J. Freedman, Tomas Sander, Adam Shostack
    Privacy Engineering for Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2001, pp:76-105 [Conf]
  3. Benny Pinkas, Tomas Sander
    Securing passwords against dictionary attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:161-170 [Conf]
  4. Tomas Sander, Amnon Ta-Shma
    Auditable, Anonymous Electronic Cash Extended Abstract. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:555-572 [Conf]
  5. Stuart Haber, Bill G. Horne, Joe Pato, Tomas Sander, Robert Endre Tarjan
    If Piracy Is the Problem, Is DRM the Answer? [Citation Graph (0, 0)][DBLP]
    Digital Rights Management, 2003, pp:224-233 [Conf]
  6. Tomas Sander
    Golden Times for Digital Rights Management? [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:55-65 [Conf]
  7. Tomas Sander, Amnon Ta-Shma
    Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:46-61 [Conf]
  8. Tomas Sander, Amnon Ta-Shma, Moti Yung
    Blind, Auditable Membership Proofs. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:53-71 [Conf]
  9. Tomas Sander, Mohammad Amin Shokrollahi
    Deciding Properties of Polynomials Without Factoring. [Citation Graph (0, 0)][DBLP]
    FOCS, 1997, pp:46-55 [Conf]
  10. Tomas Sander, Adam Young, Moti Yung
    Non-Interactive CryptoComputing For NC1. [Citation Graph (0, 0)][DBLP]
    FOCS, 1999, pp:554-567 [Conf]
  11. Tomas Sander
    Efficient Accumulators without Trapdoor Extended Abstracts. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:252-262 [Conf]
  12. Tomas Sander, Christian F. Tschudin
    On Software Protection via Function Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:111-123 [Conf]
  13. Tomas Sander, Amnon Ta-Shma
    On Anonymous Electronic Cash and Crime. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:202-206 [Conf]
  14. Tomas Sander, Christian F. Tschudin
    Protecting Mobile Agents Against Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:44-60 [Conf]
  15. Bill G. Horne, Benny Pinkas, Tomas Sander
    Escrow services and incentives in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2001, pp:85-94 [Conf]

  16. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP]


  17. Privacy Management for Global Organizations. [Citation Graph (, )][DBLP]


  18. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. [Citation Graph (, )][DBLP]


  19. Towards Mobile Cryptography. [Citation Graph (, )][DBLP]


  20. A Mechanism for Policy-Driven Selection of Service Providers in SOA and Cloud Environments. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002