From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Masking Fuzzy-Searchable Public Databases., , и . ACNS, том 11464 из Lecture Notes in Computer Science, стр. 571-591. Springer, (2019)Search on Encrypted Data in the Symmetric-Key Setting.. Selected Areas in Cryptography, том 6544 из Lecture Notes in Computer Science, стр. 281. Springer, (2010)Provable Security Analysis of FIDO2., , , и . CRYPTO (3), том 12827 из Lecture Notes in Computer Science, стр. 125-156. Springer, (2021)Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search., , , , и . USENIX Security Symposium, стр. 911-928. USENIX Association, (2021)Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation., , , и . EUROCRYPT, том 7237 из Lecture Notes in Computer Science, стр. 682-699. Springer, (2012)How Secure and Quick is QUIC? Provable Security and Performance Analyses., , , и . IEEE Symposium on Security and Privacy, стр. 214-231. IEEE Computer Society, (2015)Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard., , и . Proc. Priv. Enhancing Technol., 2024 (4): 565-582 (2024)Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation., , , и . IACR Cryptology ePrint Archive, (2015)Online Ciphers and the Hash-CBC Construction., , , и . CRYPTO, том 2139 из Lecture Notes in Computer Science, стр. 292-309. Springer, (2001)Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.. Public Key Cryptography, том 2567 из Lecture Notes in Computer Science, стр. 31-46. Springer, (2003)