From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing Electronic Voting Machines on the Example of Bingo Voting, , , , и . IEEE Transactions on Information Forensics and Security, (2009)Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator, , и . E-Voting and Identity, VOTE-ID 2007, том 4896 из Lecture Notes in Computer Science, стр. 111--124. Springer, (2007)Fairness and Correctness in Case of a Premature Abort, , и . Progress in Cryptology -- INDOCRYPT 2005, том 3797 из Lecture Notes in Computer Science, стр. 322--331. Springer, (2005)On Group Key Agreement with Cheater Identification, , и . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)Key substitution attacks revisited: Taking into account malicious signers, , и . International Journal of Information Security, 5 (1): 30--36 (2006)