From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Evolving Meaning of Information Security.. KDD, стр. 5. ACM, (2016)Cryptography: Past, Present and Future.. OTM Conferences (2), том 4804 из Lecture Notes in Computer Science, стр. 1529-1530. Springer, (2007)Analysis of a Public Key Approach Based on Polynomial Substitution., и . CRYPTO, том 218 из Lecture Notes in Computer Science, стр. 340-349. Springer, (1985)The Adolescence of Public-Key Cryptography (Abstract).. EUROCRYPT, том 434 из Lecture Notes in Computer Science, стр. 2. Springer, (1989)Privacy on the Line -- The Politics of Wiretapping and Encryption, и . The MIT Press, Cambridge, Massachusetts, (1998)Chattering about SIGINT.. IEEE Secur. Priv., 4 (1): 9 (2006)Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue., и . Des. Codes Cryptogr., 7 (1-2): 7-9 (1996)Privacy on the Line, и . Cambridge, MIT Press, (1998)The National Security Establishment and the Development of Public-Key Cryptography.. Des. Codes Cryptogr., 7 (1-2): 9-12 (1996)A Secure Audio Teleconference System., , , и . CRYPTO, том 403 из Lecture Notes in Computer Science, стр. 520-528. Springer, (1988)