From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Off-Line Reputation Scheme Using Articulated Certificates., , , и . WOSIS, стр. 53-62. INSTICC Press, (2004)Private Reputation Schemes for P2P systems., , , и . WOSIS, стр. 196-206. INSTICC Press, (2004)Five Sealed-bid Auction Models., , , и . ACSW, том 21 из CRPIT, стр. 77-86. Australian Computer Society, (2003)Round-optimal Contributory Conference Key Agreement, и . Public Key Cryptography -- PKC 2003, том 2567 из Lecture Notes in Computer Science, стр. 161--174. Springer, (2003)Key Recovery: Inert and Public., , , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 111-126. Springer, (2016)How HCI design influences web security decisions., , , и . OZCHI, стр. 252-255. ACM, (2010)"Who decides?": security and privacy in the wild., , , и . OZCHI, стр. 27-36. ACM, (2013)Chief information officer (CIO) panel: how to groom IT leadership as change agents., , , и . CPR, стр. 1-2. ACM, (2012)Signature Scheme for Controlled Environments., , и . ICICS, том 1726 из Lecture Notes in Computer Science, стр. 119-134. Springer, (1999)PassCue: The Shared Cues System in Practice., , и . PASSWORDS, том 9393 из Lecture Notes in Computer Science, стр. 119-137. Springer, (2014)