From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SEPCOM: customizable zero copy model., , , и . VALUETOOLS, стр. 37. ICST/ACM, (2007)On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes., , , и . ISPEC, том 9065 из Lecture Notes in Computer Science, стр. 469-484. Springer, (2015)ID-Based Proxy Signature Using Bilinear Pairings., , и . ISPA Workshops, том 3759 из Lecture Notes in Computer Science, стр. 359-367. Springer, (2005)Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost., , и . ProvSec, том 6980 из Lecture Notes in Computer Science, стр. 84-101. Springer, (2011)Cryptanalysis of Helix and Phelix Revisited., , и . ACISP, том 7959 из Lecture Notes in Computer Science, стр. 27-40. Springer, (2013)A New k-Anonymous Message Transmission Protocol., и . WISA, том 3325 из Lecture Notes in Computer Science, стр. 388-399. Springer, (2004)Near Collision Attack on the Grain v1 Stream Cipher., , , и . FSE, том 8424 из Lecture Notes in Computer Science, стр. 518-538. Springer, (2013)A new class of binary sequences with low correlation and large linear complexity from function fields., , и . ISIT, стр. 1997-2001. IEEE, (2005)Type-Based Analysis of Protected Storage in the TPM., , и . ICICS, том 8233 из Lecture Notes in Computer Science, стр. 135-150. Springer, (2013)HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming., , , , и . ICICS, том 7043 из Lecture Notes in Computer Science, стр. 360-373. Springer, (2011)