From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Construction of Public Key Encryption with Sender Recovery., и . Int. J. Found. Comput. Sci., 26 (1): 1-32 (2015)Database authentication revisited., , и . Comput. Secur., 13 (7): 573-580 (1994)Digital Watermarking Robust Against JPEG Compression., , и . ISW, том 1729 из Lecture Notes in Computer Science, стр. 167-190. Springer, (1999)Identity-Based Threshold Signature Scheme from the Bilinear Pairings., и . ITCC (1), стр. 124-128. IEEE Computer Society, (2004)Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract)., , и . ASIACRYPT, том 917 из Lecture Notes in Computer Science, стр. 119-132. Springer, (1994)Dynamic and risk-aware network access management., , и . SACMAT, стр. 217-230. ACM, (2003)Formal Proofs for the Security of Signcryption., , и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 80-98. Springer, (2002)Compact and Unforgeable Key Establishment over an ATM Network., и . INFOCOM, стр. 411-418. IEEE Computer Society, (1998)A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic., , и . IWIA, стр. 79-96. IEEE Computer Society, (2004)Statistical Database Modeling for Privacy Preserving Database Generation., , и . ISMIS, том 3488 из Lecture Notes in Computer Science, стр. 382-390. Springer, (2005)