From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Resilient Lkh: Secure Multicast Key Distribution Schemes., , и . Int. J. Found. Comput. Sci., 17 (5): 1205-1222 (2006)Robust Receipt-Free Election System with Ballot Secrecy and Verifiability., , и . NDSS, The Internet Society, (2008)A More Natural Way to Construct Identity-Based Identification Schemes., , , , и . ACNS, том 4521 из Lecture Notes in Computer Science, стр. 307-322. Springer, (2007)A New Unpredictability-Based RFID Privacy Model., , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 479-492. Springer, (2013)TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing., , , , , и . ISPEC, том 8434 из Lecture Notes in Computer Science, стр. 346-358. Springer, (2014)Anonymous Signature Schemes., , , и . Public Key Cryptography, том 3958 из Lecture Notes in Computer Science, стр. 347-363. Springer, (2006)Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key., , , , и . EuroS&P, стр. 215-230. IEEE, (2019)A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract)., , и . Pairing, том 6487 из Lecture Notes in Computer Science, стр. 41-61. Springer, (2010)Oblivious Transfer with Access Control : Realizing Disjunction without Duplication., , , , , , и . Pairing, том 6487 из Lecture Notes in Computer Science, стр. 96-115. Springer, (2010)Accountable Authority Attribute-Based Signature., , , и . EIDWT, стр. 773-777. IEEE Computer Society, (2013)