From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Nonmalleable Cryptography, , и . SIAM J. Comput., 30 (2): 391-437 (2000)Bloom Filters in Adversarial Environments., и . CRYPTO (2), том 9216 из Lecture Notes in Computer Science, стр. 565-584. Springer, (2015)Primary-Secondary-Resolver Membership Proof Systems., и . TCC (2), том 9015 из Lecture Notes in Computer Science, стр. 199-228. Springer, (2015)Tracing Traitors., , и . CRYPTO, том 839 из Lecture Notes in Computer Science, стр. 257-270. Springer, (1994)An Efficient Existentially Unforgeable Signature Scheme and its Applications., и . CRYPTO, том 839 из Lecture Notes in Computer Science, стр. 234-246. Springer, (1994)Timed Commitments., и . CRYPTO, том 1880 из Lecture Notes in Computer Science, стр. 236-254. Springer, (2000)Visual Authentication and Identification., и . CRYPTO, том 1294 из Lecture Notes in Computer Science, стр. 322-336. Springer, (1997)Revocation and Tracing Schemes for Stateless Receivers., , и . CRYPTO, том 2139 из Lecture Notes in Computer Science, стр. 41-62. Springer, (2001)On Robust Combiners for Oblivious Transfer and Other Primitives., , , , и . EUROCRYPT, том 3494 из Lecture Notes in Computer Science, стр. 96-113. Springer, (2005)Our Data, Ourselves: Privacy Via Distributed Noise Generation., , , , и . EUROCRYPT, том 4004 из Lecture Notes in Computer Science, стр. 486-503. Springer, (2006)