From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting., , и . Wireless Personal Communications, 94 (3): 1017-1034 (2017)Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature., , , и . Comput. J., 54 (10): 1645-1651 (2011)First price sealed bid auction without auctioneers., , и . IWCMC, стр. 127-131. ACM, (2007)Continuous leakage-resilient access control for wireless sensor networks., , , и . Ad Hoc Networks, (2018)Deniable Ring Authentication Based on Projective Hash Functions., , , и . ProvSec, том 10592 из Lecture Notes in Computer Science, стр. 127-143. Springer, (2017)An Internet Anonymous Auction Scheme., и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 171-182. Springer, (2000)Quantum private set intersection cardinality and its application to anonymous authentication., , , , и . Inf. Sci., (2016)Sanitizable Signatures Revisited., , , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 80-97. Springer, (2008)Secure and Efficient Trust Negotiation., , , , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 374-384. Springer, (2006)Novel updatable identity-based hash proof system and its applications., , , и . Theor. Comput. Sci., (2020)