From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Restricted Identification Scheme and Diffie-Hellman Linking Problem., , , и . INTRUST, том 7222 из Lecture Notes in Computer Science, стр. 221-238. Springer, (2011)Polish Concepts for Securing E-Government Document Flow., и . ISSE, стр. 399-407. Vieweg+Teubner, (2010)Kleptographic Weaknesses in Benaloh-Tuinstra Protocol., , , , и . ICSNC, стр. 26. IEEE Computer Society, (2006)Digital Signatures for e-Government - A Long-Term Security Architecture., , и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 256-270. Springer, (2010)Kleptographic attacks on a cascade of mix servers., , и . AsiaCCS, стр. 57-62. ACM, (2007)PACE with Mutual Authentication - Towards an Upgraded eID in Europe., , и . ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 501-519. Springer, (2021)Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems., , , , , и . BIS (Workshops), том 97 из Lecture Notes in Business Information Processing, стр. 270-281. Springer, (2011)How to Protect a Signature from Being Shown to a Third Party., , , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 192-202. Springer, (2006)Kleptographic Attacks on E-Voting Schemes., , , , , и . ETRICS, том 3995 из Lecture Notes in Computer Science, стр. 494-508. Springer, (2006)Stand-by Attacks on E-ID Password Authentication., , и . Inscrypt, том 8957 из Lecture Notes in Computer Science, стр. 475-495. Springer, (2014)