From post

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.

, , , , и . Public Key Cryptography (1), том 11442 из Lecture Notes in Computer Science, стр. 286-313. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TCP Ack Storm DoS Attacks., и . SEC, том 354 из IFIP Advances in Information and Communication Technology, стр. 29-40. Springer, (2011)Securing the Internet (Abstract)., , , и . PODC, стр. 257. ACM, (1995)Cross-Site Framing Attacks., , и . ACSAC, стр. 161-170. ACM, (2015)Securing the Net: Challenges, Failures and Directions.. DISC, том 3724 из Lecture Notes in Computer Science, стр. 2. Springer, (2005)Safeguarding Digital Library Contents: Charging for Online Content.. D Lib Mag., (1998)Web Spoofing and Phishing Attacks and Their Prevention.. ENC, стр. 3. IEEE Computer Society, (2004)Stratum Filtering: Cloud-based Detection of Attack Sources., , и . CCSW, стр. 47-48. ACM, (2016)Why Johnny can't surf (safely)? Attacks and defenses for web users.. Comput. Secur., 28 (1-2): 63-71 (2009)Are We There Yet? On RPKI's Deployment and Security., , , , и . NDSS, The Internet Society, (2017)Lightweight Opportunistic Tunneling (LOT)., и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 104-119. Springer, (2009)