From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme., и . Communications and Multimedia Security, том 152 из IFIP Conference Proceedings, стр. 273-290. Kluwer, (1999)Digital Rights Management for Content Distribution., , и . ACSW, том 21 из CRPIT, стр. 49-58. Australian Computer Society, (2003)Tracing traitors: a selective survey.. Digital Rights Management Workshop, стр. 72. ACM, (2004)Breaking and Mending Resilient Mix-Nets., и . Privacy Enhancing Technologies, том 2760 из Lecture Notes in Computer Science, стр. 66-80. Springer, (2003)Threshold Attribute-Based Signcryption., , и . SCN, том 6280 из Lecture Notes in Computer Science, стр. 154-171. Springer, (2010)Directional Distance-Bounding Identification., и . ICISSP (Revised Selected Papers), том 867 из Communications in Computer and Information Science, стр. 197-221. Springer, (2017)Remarks on the multiple assignment secret sharing scheme., , и . ICICS, том 1334 из Lecture Notes in Computer Science, стр. 72-80. Springer, (1997)Towards a Resilient Smart Home., , , , , и . IoT S&P@SIGCOMM, стр. 15-21. ACM, (2018)Public Key Encryption with Keyword Search Revisited., , и . IACR Cryptology ePrint Archive, (2005)A Virtual Wiretap Channel for Secure Message Transmission., , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 171-192. Springer, (2016)