From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Perfectly Secure Message Transmission., , и . CRYPTO, том 3152 из Lecture Notes in Computer Science, стр. 545-561. Springer, (2004)Asynchronous Unconditionally Secure Computation: An Efficiency Improvement., , и . INDOCRYPT, том 2551 из Lecture Notes in Computer Science, стр. 93-107. Springer, (2002)Retrieving and routing quantum information in a quantum network., , , и . Quantum Inf. Process., 14 (12): 4651-4664 (2015)Efficient Asynchronous Secure Multiparty Distributed Computation., и . INDOCRYPT, том 1977 из Lecture Notes in Computer Science, стр. 117-129. Springer, (2000)Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation., и . INDOCRYPT, том 1977 из Lecture Notes in Computer Science, стр. 130-142. Springer, (2000)Asynchronous Secure Communication Tolerating Mixed Adversaries., , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 224-242. Springer, (2002)Efficient Biometric Verification in Encrypted Domain., , , и . ICB, том 5558 из Lecture Notes in Computer Science, стр. 899-908. Springer, (2009)Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , и . PODC, стр. 397. ACM, (2004)Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 497-512. Springer, (2002)Trading Players for Efficiency in Unconditional Multiparty Computation., , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 342-353. Springer, (2002)