From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Panel: Cryptographic Protocol Models and Requirements.. CSFW, стр. 161. IEEE Computer Society, (1993)Protocols Using Anonymous Connections: Mobile Applications., , и . Security Protocols Workshop, том 1361 из Lecture Notes in Computer Science, стр. 13-23. Springer, (1997)On the Economics of Anonymity., , и . Financial Cryptography, том 2742 из Lecture Notes in Computer Science, стр. 84-102. Springer, (2003)Intention-Disguised Algorithmic Trading., , , и . Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 408-415. Springer, (2010)Metrics for Trafic Analysis Prevention., , , и . Privacy Enhancing Technologies, том 2760 из Lecture Notes in Computer Science, стр. 48-65. Springer, (2003)High-Power Proxies for Enhancing RFID Privacy and Utility., , и . Privacy Enhancing Technologies, том 3856 из Lecture Notes in Computer Science, стр. 210-226. Springer, (2005)The Use of Logic in the Analysis of Cryptographic Protocols.. S&P, стр. 156-170. IEEE Computer Society, (1991)A logical approach to multilevel security of probabilistic systems., и . S&P, стр. 164-176. IEEE Computer Society, (1992)An Epistemic Logic of Situations.. TARK, стр. 109-121. Morgan Kaufmann, (1994)The Logic of Authentication Protocols., и . FOSAD, том 2171 из Lecture Notes in Computer Science, стр. 63-136. Springer, (2000)