From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Initiator-Resilient Universally Composable Key Exchange, , и . Computer Security -- ESORICS 2003, том 2808 из Lecture Notes in Computer Science, стр. 61--84. Springer, (2003)A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels., , , , и . IACR Cryptol. ePrint Arch., (2021)A Provably Privacy Preserving Video Surveillance Architecture for an Assisted Living Community., , , и . GI-Jahrestagung, том P-232 из LNI, стр. 563-574. GI, (2014)Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules., , и . Sicherheit, том P-323 из LNI, стр. 83-99. Gesellschaft für Informatik e.V., (2022)Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels., , и . ASIACRYPT (4), том 14441 из Lecture Notes in Computer Science, стр. 268-301. Springer, (2023)ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy., , , , , и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 665-695. Springer, (2021)On Group Key Agreement with Cheater Identification, , и . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)Towards Realising Oblivious Voting., , , , и . ICETE (Selected Papers), том 764 из Communications in Computer and Information Science, стр. 216-240. Springer, (2016)Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions., , и . TCC (1), том 13042 из Lecture Notes in Computer Science, стр. 750-781. Springer, (2021)Methods to Secure Services in an Untrusted Environment., и . Software Engineering, том P-183 из LNI, стр. 159-170. GI, (2011)