From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices., , , и . Public Key Cryptography, том 7293 из Lecture Notes in Computer Science, стр. 467-484. Springer, (2012)Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys., и . ICISC, том 7259 из Lecture Notes in Computer Science, стр. 490-509. Springer, (2011)Revocable Hierarchical Identity-Based Authenticated Key Exchange., , , , , и . ICISC, том 13218 из Lecture Notes in Computer Science, стр. 3-27. Springer, (2021)Secure distributed constraint satisfaction: reaching agreement without revealing private information., , и . Artif. Intell., 161 (1-2): 229-245 (2005)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , и . IWSEC, том 6434 из Lecture Notes in Computer Science, стр. 164-180. Springer, (2010)Strongly secure authenticated key exchange from factoring, codes, and lattices., , , и . Des. Codes Cryptogr., 76 (3): 469-504 (2015)Traceable Ring Signature., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 83-93 (2008)Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information., , и . CP, том 2470 из Lecture Notes in Computer Science, стр. 387-401. Springer, (2002)Relinkable Ring Signature., , и . CANS, том 5888 из Lecture Notes in Computer Science, стр. 518-536. Springer, (2009)Secure Generalized Vickrey Auction without Third-party Servers., и . Financial Cryptography, том 3110 из Lecture Notes in Computer Science, стр. 132-146. Springer, (2004)