From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction to Algorithms, , и . MIT Press ; McGraw-Hill, (1990)Proxy-based security protocols in networked mobile devices., , , , , и . SAC, стр. 265-272. ACM, (2002)An Omega(n^2 log n) Lower Bound to the Shortest Paths Problem, , и . STOC, стр. 11-17. ACM, (1977)Linear Time Bounds for Median Computations, , , , и . STOC, стр. 119-124. ACM, (1972)Optimal Arrangement of Keys in a Hash Table.. J. ACM, 25 (2): 200-209 (1978)Keys under doormats., , , , , , , , , и 5 other автор(ы). Commun. ACM, 58 (10): 24-26 (2015)Transitive Signature Schemes., и . CT-RSA, том 2271 из Lecture Notes in Computer Science, стр. 236-243. Springer, (2002)Electronic Lottery Tickets as Micropayments.. Financial Cryptography, том 1318 из Lecture Notes in Computer Science, стр. 307-314. Springer, (1997)Perspectives on Financial Cryptography.. Financial Cryptography, том 1318 из Lecture Notes in Computer Science, стр. 145-150. Springer, (1997)The RC5 Encryption Algorithm.. FSE, том 1008 из Lecture Notes in Computer Science, стр. 86-96. Springer, (1994)