From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RFID Security: Tradeoffs between Security and Efficiency., и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 318-332. Springer, (2008)Essentially Optimal Universally Composable Oblivious Transfer., , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 318-335. Springer, (2008)Isolated Proofs of Knowledge and Isolated Zero Knowledge., , и . EUROCRYPT, том 4965 из Lecture Notes in Computer Science, стр. 509-526. Springer, (2008)Multiparty Computation from Threshold Homomorphic Encryption., , и . EUROCRYPT, том 2045 из Lecture Notes in Computer Science, стр. 280-299. Springer, (2001)Simplified Threshold RSA with Adaptive and Proactive Security., , и . EUROCRYPT, том 4004 из Lecture Notes in Computer Science, стр. 593-611. Springer, (2006)Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption., и . CRYPTO, том 2729 из Lecture Notes in Computer Science, стр. 247-264. Springer, (2003)Multiparty Unconditionally Secure Protocols (Abstract)., , и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 462. Springer, (1987)On the Amortized Complexity of Zero-Knowledge Protocols., и . CRYPTO, том 5677 из Lecture Notes in Computer Science, стр. 177-191. Springer, (2009)Secure Identification and QKD in the Bounded-Quantum-Storage Model., , , и . CRYPTO, том 4622 из Lecture Notes in Computer Science, стр. 342-359. Springer, (2007)Oblivious Transfer and Linear Functions., , , и . CRYPTO, том 4117 из Lecture Notes in Computer Science, стр. 427-444. Springer, (2006)