From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Low-Exponent RSA with Related Messages., , , и . EUROCRYPT, том 1070 из Lecture Notes in Computer Science, стр. 1-9. Springer, (1996)Two-Party Generation of DSA Signatures., и . CRYPTO, том 2139 из Lecture Notes in Computer Science, стр. 137-154. Springer, (2001)Censorship Resistance Revisited., , и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 62-76. Springer, (2005)CCSW'16: 8th ACM Cloud Computing Security Workshop., и . ACM Conference on Computer and Communications Security, стр. 1882-1883. ACM, (2016)The security of modern password expiration: an algorithmic framework and empirical analysis., , и . ACM Conference on Computer and Communications Security, стр. 176-186. ACM, (2010)Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols., , , , , и . ACM Conference on Computer and Communications Security, стр. 2387-2402. ACM, (2019)BEAT: Asynchronous BFT Made Practical., , и . ACM Conference on Computer and Communications Security, стр. 2028-2041. ACM, (2018)Bounded vector signatures and their applications., , и . AsiaCCS, стр. 277-285. ACM, (2011)Discouraging Software Piracy Using Software Aging., и . Digital Rights Management Workshop, том 2320 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2001)Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games., , , , и . CoRR, (2021)