From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal., и . ICEIS, стр. 962-967. (2002)Identity-Based Encryption with Non-Interactive Key Update, , , и . Cryptology ePrint Archive, Report 2004/338, (2004)Anonymous authentication scheme for XML security standard with Refreshable Tokens., , и . XML Security, стр. 86-93. ACM, (2003)Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature, , , и . CoRR, (2006)Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems., , , и . IACR Cryptology ePrint Archive, (2009)Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems., , и . ICB, том 4642 из Lecture Notes in Computer Science, стр. 396-406. Springer, (2007)Coding Theory and its Applications in Japan., и . AAECC, том 356 из Lecture Notes in Computer Science, page 301-305. Springer, (1987)Information Security Aspects of Spread Spectrum Systems.. ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 193-208. Springer, (1994)Dual-Policy Attribute Based Encryption., and . ACNS, volume 5536 of Lecture Notes in Computer Science, page 168-185. (2009)IDS False Alarm Reduction Using Continuous and Discontinuous Patterns., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 192-205. (2005)