From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revokable and Versatile Electronic Money (extended abstract)., и . ACM Conference on Computer and Communications Security, стр. 76-87. ACM, (1996)Witness-Based Cryptographic Program Checking and Robust Function Sharing., , и . STOC, стр. 499-508. ACM, (1996)Coins, Weights and Contention in Balancing Networks., , и . PODC, стр. 193-205. ACM, (1994)Witness-Based Cryptographic Program Checking and Applications (an Announcement)., , и . PODC, стр. 211. ACM, (1996)Distributing the Power of a Government to Enhance the Privacy of Voters (Extended Abstract)., и . PODC, стр. 52-62. ACM, (1986)Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack., и . The New Codebreakers, том 9100 из Lecture Notes in Computer Science, стр. 243-255. Springer, (2016)Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information., , и . INFOCOM, стр. 928-936. IEEE Computer Society, (1996)Access regulation mechanism for switch-based LAN., и . Comput. Networks, 31 (5): 505-518 (1999)Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions., , и . ICALP, том 55 из LIPIcs, стр. 30:1-30:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Special Issue on Advanced Persistent Threat., , , и . Future Gener. Comput. Syst., (2018)