From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Low-randomness constant-round private XOR computations., , и . Int. J. Inf. Sec., 6 (1): 15-26 (2007)Performance evaluation of web services invocation over Bluetooth., , , и . PM2HW2N, стр. 1-8. ACM, (2006)Innovative approaches for security of small artefacts., , , , , , и . Comput. Sci. Rev., 5 (1): 47-55 (2011)Lower Bounds for Robust Secret Sharing Schemes., и . Inf. Process. Lett., 63 (6): 317-321 (1997)Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports., , , , , и . Financial Cryptography Workshops, том 6054 из Lecture Notes in Computer Science, стр. 94-104. Springer, (2010)Randomness Recycling in Constant-Round Private Computations (extended Abstract)., , и . DISC, том 1693 из Lecture Notes in Computer Science, стр. 138-150. Springer, (1999)Space Requirements for Broadcast Encryption., и . EUROCRYPT, том 950 из Lecture Notes in Computer Science, стр. 287-298. Springer, (1994)Graph Decompositions and Secret Sharing Schemes., , , и . EUROCRYPT, том 658 из Lecture Notes in Computer Science, стр. 1-24. Springer, (1992)Certified Information Access., , , и . J. Syst. Softw., 86 (9): 2439-2450 (2013)A Software Infrastructure for Authenticated Web Metering., и . Computer, 37 (4): 28-33 (2004)