Published in

N&N Global Technology, International Journal of Information Security, 6(7), p. 395-420

DOI: 10.1007/s10207-008-0057-y

Links

Tools

Export citation

Search in Google Scholar

Specifying and implementing privacy-preserving cryptographic protocols

Journal article published in 2008 by Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Red circle
Preprint: archiving forbidden
Red circle
Postprint: archiving forbidden
Green circle
Published version: archiving allowed
Data provided by SHERPA/RoMEO