From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Primary-Secondary-Resolver Membership Proof Systems., и . TCC (2), том 9015 из Lecture Notes in Computer Science, стр. 199-228. Springer, (2015)Bloom Filters in Adversarial Environments., и . CRYPTO (2), том 9216 из Lecture Notes in Computer Science, стр. 565-584. Springer, (2015)Untraceable Electronic Cash., , и . CRYPTO, том 403 из Lecture Notes in Computer Science, стр. 319-327. Springer, (1988)Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery., , и . ITC, том 163 из LIPIcs, стр. 9:1-9:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Traitor tracing with constant size ciphertext., и . ACM Conference on Computer and Communications Security, стр. 501-510. ACM, (2008)How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior., , и . ACM Conference on Computer and Communications Security, стр. 1369-1386. ACM, (2019)Bloom Filters in Adversarial Environments., и . ACM Trans. Algorithms, 15 (3): 35:1-35:30 (2019)Mirror games against an open book player., и . Theor. Comput. Sci., (октября 2023)Derandomized Constructions of k-Wise (Almost) Independent Permutations, , и . Electron. Colloquium Comput. Complex., (2006)Fast Interactive Coding against Adversarial Noise., , и . J. ACM, 61 (6): 35:1-35:30 (2014)