From post

Certificate Authority using Multiple Signing Keys against Signature Scheme Compromised.

, , и . CCCT (1), стр. 52-56. The International Institute of Informatics and Systemics (IIIS), (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of a Hybrid Wavelength Selective Crossconnect Utilizing a Silicon Optical Switch Array., , , , , и . OECC/PSC, стр. 1-4. IEEE, (2022)Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison., , и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 408-419. Springer, (2001)Efficient Sealed-Bid Auction Using Hash Chain., , и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 183-191. Springer, (2000)Best Differential Characteristic Search of FEAL., , и . FSE, том 1267 из Lecture Notes in Computer Science, стр. 41-53. Springer, (1997)Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic., , , и . EUROCRYPT, том 1592 из Lecture Notes in Computer Science, стр. 176-189. Springer, (1999)Certificate Authority using Multiple Signing Keys against Signature Scheme Compromised., , и . CCCT (1), стр. 52-56. The International Institute of Informatics and Systemics (IIIS), (2004)