From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guest editorial: special issue on electronic voting., , , , , и . IEEE Trans. Inf. Forensics Secur., 4 (4): 593-596 (2009)Anonymous Split E-Cash - Toward Mobile Anonymous Payments., , , , и . ACM Trans. Embed. Comput. Syst., 14 (4): 85:1-85:25 (2015)Survey of Security Aspect of V2X Standards and Related Issues., и . CSCN, стр. 1-5. IEEE, (2019)High-performance Public-key Cryptoprocessor for Wireless Mobile Applications., , , и . Mob. Networks Appl., 12 (4): 245-258 (2007)Decentralized Privacy-Preserving Proximity Tracing., , , , , , , , , и 23 other автор(ы). IEEE Data Eng. Bull., 43 (2): 36-66 (2020)Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds., , , и . CRYPTO, том 773 из Lecture Notes in Computer Science, стр. 212-223. Springer, (1993)Secure Communication for Secure Agent-Based Electronic Commerce Applications., , и . E-Commerce Agents, том 2033 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2001)Hash Functions Based on Block Ciphers and Quaternary Codes., и . ASIACRYPT, том 1163 из Lecture Notes in Computer Science, стр. 77-90. Springer, (1996)MAC Algorithms.. Encyclopedia of Cryptography and Security, Springer, (2005)MDC-2 and MDC-4.. Encyclopedia of Cryptography and Security, Springer, (2005)