From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Selecting Secure Passwords.. CT-RSA, том 4377 из Lecture Notes in Computer Science, стр. 49-66. Springer, (2007)Best Effort and Practice Activation Codes., и . TrustBus, том 6863 из Lecture Notes in Computer Science, стр. 98-112. Springer, (2011)Fast Irreducibility and Subgroup Membership Testing in XTR., и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 73-86. Springer, (2001)Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals., и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 119-133. Springer, (1997)Cell-Based Roadpricing., , и . EuroPKI, том 7163 из Lecture Notes in Computer Science, стр. 106-122. Springer, (2011)The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)., , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 339-345. Springer, (2016)An Efficient Self-blindable Attribute-Based Credential Scheme., , и . Financial Cryptography, том 10322 из Lecture Notes in Computer Science, стр. 3-20. Springer, (2017)Looking beyond XTR., , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 46-63. Springer, (2002)Selecting Cryptographic Key Sizes, и . Journal of Cryptology: the journal of the International Association for Cryptologic Research, 14 (4): 255--293 (2001)Constructions and Properties of k out of n Visual Secret Sharing Schemes., и . Des. Codes Cryptogr., 11 (2): 179-196 (1997)