From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Alternative Digit Sets for Nonadjacent Representations., и . Selected Areas in Cryptography, том 3006 из Lecture Notes in Computer Science, стр. 306-319. Springer, (2003)Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures., и . Selected Areas in Cryptography, том 1758 из Lecture Notes in Computer Science, стр. 200-214. Springer, (1999)Preface: In Honour of Ronald C. Mullin., , и . Des. Codes Cryptogr., 26 (1-3): 5-6 (2002)The Lovász Local Lemma and Its Applications to some Combinatorial Arrays., , и . Des. Codes Cryptogr., 32 (1-3): 121-134 (2004)Group Testing and Batch Verification., и . ICITS, том 5973 из Lecture Notes in Computer Science, стр. 140-157. Springer, (2009)Generalized mix functions and orthogonal equitable rectangles.. Des. Codes Cryptogr., 45 (3): 347-357 (2007)A Simple Analysis of the Error Probability of Two-Point Based Sampling., и . Inf. Process. Lett., 60 (2): 91-96 (1996)A Critical Analysis and Improvement of AACS Drive-Host Authentication., и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 37-52. Springer, (2008)A tight bound on the size of certain separating hash families., и . CoRR, (2015)On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption.. Des. Codes Cryptography, 12 (3): 215-243 (1997)