From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Role of Arbiters in Asymmetric Authentication Schemes., , , и . ISC, том 2851 из Lecture Notes in Computer Science, стр. 428-441. Springer, (2003)Identity-Based Encryption with Non-Interactive Key Update, , , и . Cryptology ePrint Archive, Report 2004/338, (2004)Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application., , , и . IACR Cryptology ePrint Archive, (2004)Unconditionally Secure Anonymous Encryption and Group Authentication., , , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 81-99. Springer, (2002)Parallel Key-Insulated Public Key Encryption., , и . Public Key Cryptography, том 3958 из Lecture Notes in Computer Science, стр. 105-122. Springer, (2006)Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication., , , , и . AAECC, том 3857 из Lecture Notes in Computer Science, стр. 154-162. Springer, (2006)Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption., , , , и . VIETCRYPT, том 4341 из Lecture Notes in Computer Science, стр. 366-384. Springer, (2006)Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application., , , и . ASIACRYPT, том 3788 из Lecture Notes in Computer Science, стр. 495-514. Springer, (2005)Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions., , , и . ICICS, том 2513 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2002)