From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving the Efficiency of RFID Authentication with Pre-Computation., , и . AISC, том 125 из CRPIT, стр. 91-100. Australian Computer Society, (2012)Low-Cost and Strong-Security RFID Authentication Protocol., , , и . EUC Workshops, том 4809 из Lecture Notes in Computer Science, стр. 795-807. Springer, (2007)Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach., , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 166-179. Springer, (2003)Efficient One-Round Key Exchange in the Standard Model., , , и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 69-83. Springer, (2008)GBD Threshold Cryptography with an Application to RSA Key Recovery., , , и . ACISP, том 3574 из Lecture Notes in Computer Science, стр. 394-405. Springer, (2005)Attribute-Based Authenticated Key Exchange., , и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 300-317. Springer, (2010)Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions., , и . INDOCRYPT, том 4329 из Lecture Notes in Computer Science, стр. 176-190. Springer, (2006)Automating Computational Proofs for Public-Key-Based Key Exchange., , и . ProvSec, том 6402 из Lecture Notes in Computer Science, стр. 53-69. Springer, (2010)Verifier-Key-Flexible Universal Designated-Verifier Signatures., , , , и . IMACC, том 4887 из Lecture Notes in Computer Science, стр. 403-421. Springer, (2007)Universally composable contributory group key exchange., , и . AsiaCCS, стр. 146-156. ACM, (2009)