From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Note on "ℰ., и . Math. Log. Q., 33 (2): 115-121 (1987)Kleptographic Weaknesses in Benaloh-Tuinstra Protocol., , , , и . ICSNC, стр. 26. IEEE Computer Society, (2006)On Distributed Cardinality Estimation: Random Arcs Recycled., , и . ANALCO, стр. 129-137. SIAM, (2015)Digital Signatures for e-Government - A Long-Term Security Architecture., , и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 256-270. Springer, (2010)Restricted Identification Scheme and Diffie-Hellman Linking Problem., , , и . INTRUST, том 7222 из Lecture Notes in Computer Science, стр. 221-238. Springer, (2011)Polish Concepts for Securing E-Government Document Flow., и . ISSE, стр. 399-407. Vieweg+Teubner, (2010)Conditional Digital Signatures., , , и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 206-215. Springer, (2005)Mutual Chip Authentication., , , и . TrustCom/ISPA/IUCC, стр. 1683-1689. IEEE Computer Society, (2013)Rapid Mixing and Security of Chaum's Visual Electronic Voting., , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 132-145. Springer, (2003)Computational Power of One-Way Multihead Finite Automata.. STACS, том 415 из Lecture Notes in Computer Science, стр. 176-187. Springer, (1990)