From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An analysis of the EMV channel establishment protocol., , , и . ACM Conference on Computer and Communications Security, стр. 373-386. ACM, (2013)Efficient Network Coding Signatures in the Standard Model., , и . Public Key Cryptography, том 7293 из Lecture Notes in Computer Science, стр. 680-696. Springer, (2012)Secure Software Licensing: Models, Constructions, and Proofs., и . CSF, стр. 31-44. IEEE Computer Society, (2016)Identity Based Group Signatures from Hierarchical Identity-Based Encryption., и . Pairing, том 5671 из Lecture Notes in Computer Science, стр. 150-170. Springer, (2009)Computationally Sound Symbolic Secrecy in the Presence of Hash Functions., , , и . FSTTCS, том 4337 из Lecture Notes in Computer Science, стр. 176-187. Springer, (2006)Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , и . CT-RSA, том 11405 из Lecture Notes in Computer Science, стр. 127-148. Springer, (2019)Symbolic Methods for Provable Security.. ProvSec, том 5848 из Lecture Notes in Computer Science, стр. 2. Springer, (2009)On the Minimal Assumptions of Group Signature Schemes., и . ICICS, том 3269 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2004)On Limitations of the Fiat­ - Shamir Transformation., и . IACR Cryptology ePrint Archive, (2015)Security analysis of cryptographically controlled access to XML documents., и . J. ACM, 55 (2): 6:1-6:29 (2008)