From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt., , и . PrAISe@ECAI, стр. 1:1-1:8. ACM, (2016)Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals., , , , , , и . WIFS, стр. 1-6. IEEE, (2017)Password Authenticated Key Exchange by Juggling., и . Security Protocols Workshop, том 6615 из Lecture Notes in Computer Science, стр. 159-171. Springer, (2008)Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme., , и . Financial Cryptography Workshops, том 12063 из Lecture Notes in Computer Science, стр. 310-318. Springer, (2020)vVote: A Verifiable Voting System., , , и . ACM Trans. Inf. Syst. Secur., 18 (1): 3:1-3:30 (2015)Public Evidence from Secret Ballots., , , , , , , , и . E-VOTE-ID, том 10615 из Lecture Notes in Computer Science, стр. 84-109. Springer, (2017)Enforcing the Unenforceable.. Security Protocols Workshop, том 3364 из Lecture Notes in Computer Science, стр. 178-182. Springer, (2003)Verifiable Postal Voting., , и . Security Protocols Workshop, том 8263 из Lecture Notes in Computer Science, стр. 54-65. Springer, (2013)Mathematical Models of Computer Security.. FOSAD, том 2171 из Lecture Notes in Computer Science, стр. 1-62. Springer, (2000)vVote: a Verifiable Voting System (DRAFT)., , , и . CoRR, (2014)