Author of the publication

Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems.

, and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 366-377. Springer, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimal Algorithm for the Construction of Optimal Prefix Codes with Given Fringe., and . Data Compression Conference, page 297-306. IEEE Computer Society, (1991)Improved Schemes for Visual Cryptography., , and . Des. Codes Cryptogr., 24 (3): 255-278 (2001)A t-private k-database information retrieval scheme., , and . Int. J. Inf. Sec., 1 (1): 64-68 (2001)On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines., , , and . Appl. Soft Comput., 13 (1): 615-627 (2013)Unconditionally secure key assignment schemes., , and . Discret. Appl. Math., 154 (2): 234-252 (2006)A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants., , , , , and . Future Gener. Comput. Syst., (2017)Cryptographic Hierarchical Access Control for Dynamic Structures., , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2349-2364 (2016)On the protection of consumer genomic data in the Internet of Living Things., , , , , and . Comput. Secur., (2018)Security and privacy issues in the Portable Document Format., , and . J. Syst. Softw., 83 (10): 1813-1822 (2010)Zero-Knowledge Arguments and Public-Key Cryptography, , and . Inf. Comput., 121 (1): 23-40 (August 1995)