From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Response to ''Can We Eliminate Certificate Revocation Lists?''., и . Financial Cryptography, том 1962 из Lecture Notes in Computer Science, стр. 245-258. Springer, (2000)Coercion Resistant End-to-end Voting., , и . Financial Cryptography, том 5628 из Lecture Notes in Computer Science, стр. 344-361. Springer, (2009)Off-Line Generation of Limited-Use Credit Card Numbers., и . Financial Cryptography, том 2339 из Lecture Notes in Computer Science, стр. 187-200. Springer, (2001)Outsourcing Medical Dataset Analysis: A Possible Solution., , и . Financial Cryptography, том 10322 из Lecture Notes in Computer Science, стр. 98-123. Springer, (2017)Designing for Audit: A Voting Machine with a Tiny TCB., , и . Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 312-319. Springer, (2010)MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers., , и . STM, том 9871 из Lecture Notes in Computer Science, стр. 196-211. Springer, (2016)Securing Wireless and Mobile Networks - Is It Possible?, , , , и . INFOCOM, IEEE Computer Society, (2002)Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity., , , и . Financial Cryptography Workshops, том 8438 из Lecture Notes in Computer Science, стр. 140-155. Springer, (2014)Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System., , и . USENIX Security Symposium, USENIX Association, (2000)Bio-Inspired, Host-based Firewall., , , , , , и . CSE, стр. 86-91. IEEE, (2020)