From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formally verifiable features in embedded vehicular security systems., , , , , и . VNC, стр. 1-7. IEEE, (2009)Unconditionally Secure Anonymous Encryption and Group Authentication., , , и . Comput. J., 49 (3): 310-321 (2006)An improvement of discrete Tardos fingerprinting codes., , , , , , и . IACR Cryptology ePrint Archive, (2008)On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, , , и . IACR Cryptology ePrint Archive, (2003)Relation between XL algorithm and Gröbner Bases Algorithms., , и . IACR Cryptology ePrint Archive, (2004)An Image Sanitizing Scheme Using Digital Watermarking., , , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 474-482. Springer, (2009)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , и . EuroPKI, том 3545 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2005)Chosen Ciphertext Secure Public Key Encryption with a Simple Structure., , , и . IWSEC, том 5312 из Lecture Notes in Computer Science, стр. 20-33. Springer, (2008)Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem., и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 96-110. Springer, (2003)An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge., , и . ICALP (2), том 4052 из Lecture Notes in Computer Science, стр. 46-57. Springer, (2006)