From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic., , , и . ESORICS (1), том 13554 из Lecture Notes in Computer Science, стр. 237-255. Springer, (2022)GDPR - Challenges for Reconciling Legal Rules with Technical Reality., , и . ESORICS (1), том 12308 из Lecture Notes in Computer Science, стр. 736-755. Springer, (2020)Bandwidth-Optimal Kleptographic Attacks., и . CHES, том 2162 из Lecture Notes in Computer Science, стр. 235-250. Springer, (2001)Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance., и . CSCML, том 12716 из Lecture Notes in Computer Science, стр. 379-396. Springer, (2021)Configuration and performance issues in the MetaNet design., , и . LCN, стр. 291-299. IEEE Computer Society, (1993)A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes., , и . ACNS (2), том 12147 из Lecture Notes in Computer Science, стр. 145-164. Springer, (2020)Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE., , , , , и . IACR Cryptol. ePrint Arch., (2024)Friendly Observers Ease Off-Line E-Cash., , и . CARDIS, том 180 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (2000)The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution., , и . IAW, стр. 288-291. IEEE, (2003)Revokable and Versatile Electronic Money (extended abstract)., и . ACM Conference on Computer and Communications Security, стр. 76-87. ACM, (1996)