From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Anonymity Notions for Identity-Based Encryption., и . Formal to Practical Security, том 5458 из Lecture Notes in Computer Science, стр. 138-157. Springer, (2009)Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness., , , и . AFRICACRYPT, том 5580 из Lecture Notes in Computer Science, стр. 254-271. Springer, (2009)Monotone Signatures., , и . Financial Cryptography, том 2339 из Lecture Notes in Computer Science, стр. 295-308. Springer, (2001)Mutual Authentication for Low-Power Mobile Devices., и . Financial Cryptography, том 2339 из Lecture Notes in Computer Science, стр. 169-186. Springer, (2001)Self-Scrambling Anonymizers.. Financial Cryptography, том 1962 из Lecture Notes in Computer Science, стр. 259-275. Springer, (2000)How to Disembed a Program?, , , и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 441-454. Springer, (2004)New Security Results on Encrypted Key Exchange., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 145-158. Springer, (2004)Distributed Public-Key Cryptography from Weak Secrets., , , и . Public Key Cryptography, том 5443 из Lecture Notes in Computer Science, стр. 139-159. Springer, (2009)Secure Mobile Gambling., , и . CT-RSA, том 2020 из Lecture Notes in Computer Science, стр. 110-125. Springer, (2001)GEM: A Generic Chosen-Ciphertext Secure Encryption Method., , , , , и . CT-RSA, том 2271 из Lecture Notes in Computer Science, стр. 263-276. Springer, (2002)