From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack., и . The New Codebreakers, том 9100 из Lecture Notes in Computer Science, стр. 243-255. Springer, (2016)Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information., , и . INFOCOM, стр. 928-936. IEEE Computer Society, (1996)Access regulation mechanism for switch-based LAN., и . Comput. Networks, 31 (5): 505-518 (1999)Special Issue on Advanced Persistent Threat., , , и . Future Gener. Comput. Syst., (2018)Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions., , и . ICALP, том 55 из LIPIcs, стр. 30:1-30:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)The combinatorics of hidden diversity., , , и . Theor. Comput. Sci., (2020)General Group Authentication Codes and Their Relation to Ünconditionally-Secure Signatures"., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 231-247. Springer, (2004)Adaptive Security for the Additive-Sharing Based Proactive RSA., , и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 240-263. Springer, (2001)Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies., , и . Public Key Cryptography, том 7778 из Lecture Notes in Computer Science, стр. 423-442. Springer, (2013)Self-tallying Elections and Perfect Ballot Secrecy., и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 141-158. Springer, (2002)