From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity-Based Chameleon Hash and Applications., и . Financial Cryptography, том 3110 из Lecture Notes in Computer Science, стр. 164-180. Springer, (2004)Secret Locking: Exploring New Approaches to Biometric Key Encapsulation., , и . ICETE (Selected Papers), том 3 из Communications in Computer and Information Science, стр. 101-112. (2005)TRICERT: A Distributed Certified E-Mail Scheme., , и . NDSS, The Internet Society, (2001)X-Online: An Online Interface for Digital Decryption Tools., , , , и . SADFE, стр. 105-116. IEEE Computer Society, (2007)E-Crime Investigative Technologies., , , и . HICSS, стр. 486. IEEE Computer Society, (2008)On the Key Exposure Problem in Chameleon Hashes., и . SCN, том 3352 из Lecture Notes in Computer Science, стр. 165-179. Springer, (2004)Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer., , и . Security Protocols Workshop, том 4631 из Lecture Notes in Computer Science, стр. 228-237. Springer, (2005)Robust, anonymous RFID authentication with constant key-lookup., , и . AsiaCCS, стр. 283-291. ACM, (2008)Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols., , и . SecureComm, стр. 1-9. IEEE, (2006)Towards Provable Security for Ubiquitous Applications., , и . ACISP, том 4058 из Lecture Notes in Computer Science, стр. 295-312. Springer, (2006)