From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The MMO problem., , , , и . CoRR, (2014)DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead., , , , и . ESORICS (1), том 9326 из Lecture Notes in Computer Science, стр. 224-242. Springer, (2015)Polynomial Time Algorithms for Multicast Network Code Construction, , , , , , и . #IEEE_J_IT#, 51 (6): 1973 - 1982 (июня 2005)HIMMO: a collusion-resistant identity-based scheme for symmetric key generation., , , , и . ACM Commun. Comput. Algebra, 49 (1): 19 (2015)Lighting systems control for demand response., , , , и . ISGT, стр. 1-6. IEEE, (2012)Coding and bounds for partially defective memory cells., , , и . Des. Codes Cryptogr., 91 (12): 4019-4058 (декабря 2023)Results on polynomial interpolation with mixed modular operations and unknown moduli., , , и . IACR Cryptology ePrint Archive, (2015)Improved key-reconciliation method., , и . IACR Cryptology ePrint Archive, (2017)Round2: KEM and PKE based on GLWR., , , , , , и . IACR Cryptology ePrint Archive, (2017)DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS., , , , и . IACR Cryptology ePrint Archive, (2014)