From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Leak a Secret and Reap the Rewards Too., и . LATINCRYPT, том 8895 из Lecture Notes in Computer Science, стр. 348-367. Springer, (2014)Generalized Secret Sharing Schemes Using NμMDS Codes., и . MACIS, том 11989 из Lecture Notes in Computer Science, стр. 234-248. Springer, (2019)Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric., и . ATIS, том 1116 из Communications in Computer and Information Science, стр. 300-311. Springer, (2019)A Hybrid Approach for Fast Anomaly Detection in Controller Area Networks., , и . IEEE ANTS, стр. 1-6. IEEE, (2020)Anonymous Fair Auction on Blockchain., , , , и . NTMS, стр. 1-5. IEEE, (2021)A Secure Anonymous Proxy Multi-signature Scheme., и . SECRYPT, стр. 55-66. SciTePress, (2014)Secure Boot in Post-Quantum Era - (Invited Paper)., , , , , , , , , и . INDOCRYPT (2), том 14460 из Lecture Notes in Computer Science, стр. 223-239. Springer, (2023)Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016)., и . J. Hardw. Syst. Secur., 1 (3): 201-202 (2017)Linear Secret Sharing Schemes with Finer Access Structure., и . ICMC, том 1262 из Advances in Intelligent Systems and Computing, стр. 179-191. Springer, (2020)Efficient and Secure Many-to-One Signature Delegation., и . ICICS, том 9543 из Lecture Notes in Computer Science, стр. 252-259. Springer, (2015)