From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inadequacy of the Queue-Based Max-Weight Optimal Scheduler on Wireless Links with TCP Sources., , и . ICC, стр. 1-6. IEEE, (2009)Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier., , , и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 140-160. Springer, (2013)Non-Malleable Codes for Space-Bounded Tampering., , , и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 95-126. Springer, (2017)Exact PDF equations and closure approximations for advective-reactive transport., , , и . J. Comput. Phys., (2013)Subversion-Resilient Signature Schemes., , и . ACM Conference on Computer and Communications Security, стр. 364-375. ACM, (2015)Non-malleable Encryption: Simpler, Shorter, Stronger., , , , и . J. Cryptol., 33 (4): 1984-2033 (2020)Implicit step-truncation integration of nonlinear PDEs on low-rank tensor manifolds., и . CoRR, (2022)A Tamper and Leakage Resilient von Neumann Architecture., , , и . Public Key Cryptography, том 9020 из Lecture Notes in Computer Science, стр. 579-603. Springer, (2015)Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate., и . CRYPTO (2), том 11693 из Lecture Notes in Computer Science, стр. 448-479. Springer, (2019)Vision: What If They All Die? Crypto Requirements For Key People., , , , и . EuroS&P Workshops, стр. 178-183. IEEE, (2020)