From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing., , , и . CNS, стр. 1-9. IEEE, (2018)Astrolabous: A Universally Composable Time-Lock Encryption Scheme., , и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 398-426. Springer, (2021)Universally Composable Simultaneous Broadcast against a Dishonest Majority and Applications., , , , и . PODC, стр. 200-210. ACM, (2023)Practical Everlasting Privacy., , , и . POST, том 7796 из Lecture Notes in Computer Science, стр. 21-40. Springer, (2013)Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity., , и . POST, том 7215 из Lecture Notes in Computer Science, стр. 169-188. Springer, (2012)A Formal Treatment of Hardware Wallets., , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 426-445. Springer, (2019)Privacy through Pseudonymity in Mobile Telephony Systems., , , и . NDSS, The Internet Society, (2014)Analysing Unlinkability and Anonymity Using the Applied Pi Calculus., , , и . CSF, стр. 107-121. IEEE Computer Society, (2010)Quantum Physical Unclonable Functions: Possibilities and Impossibilities., , , и . Quantum, (2021)StatVerif: Verification of stateful processes., , , и . J. Comput. Secur., 22 (5): 743-821 (2014)