From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme., , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 564-575. Springer, (2014)Splitting and Aggregating Signatures in Cryptocurrency Protocols., , , , и . DAPPCON, стр. 100-108. IEEE, (2019)CCA Secure Certificateless Encryption Schemes based on RSA., , и . SECRYPT, стр. 208-217. SciTePress, (2011)Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 497-512. Springer, (2002)On Proactive Perfectly Secure Message Transmission., , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 461-473. Springer, (2007)Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience., и . ICITS, том 6673 из Lecture Notes in Computer Science, стр. 206-226. Springer, (2011)Non-perfect Secret Sharing over General Access Structures., , и . INDOCRYPT, том 2551 из Lecture Notes in Computer Science, стр. 409-421. Springer, (2002)Trading Players for Efficiency in Unconditional Multiparty Computation., , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 342-353. Springer, (2002)A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs., , и . WALCOM, том 6552 из Lecture Notes in Computer Science, стр. 191-201. Springer, (2011)Core and Conditional Core Path of Specified Length in Special Classes of Graphs., , и . WALCOM, том 5431 из Lecture Notes in Computer Science, стр. 262-273. Springer, (2009)