From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., и . DMIN, стр. 308-314. CSREA Press, (2007)A note on the Certificateless Multi-receiver Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2009)Compact CCA-Secure Encryption with Ciphertext Verifiability., , и . IACR Cryptology ePrint Archive, (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , и . IACR Cryptology ePrint Archive, (2008)A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers., , и . IACR Cryptology ePrint Archive, (2016)Brief announcement: communication efficient asynchronous byzantine agreement., и . PODC, стр. 243-244. ACM, (2010)Possibility and complexity of probabilistic reliable communication in directed networks., и . PODC, стр. 265-274. ACM, (2006)Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , и . PODC, стр. 397. ACM, (2004)On Composability of Reliable Unicast and Broadcast., , , и . ICDCN, том 5935 из Lecture Notes in Computer Science, стр. 54-66. Springer, (2010)Core and Conditional Core Path of Specified Length in Special Classes of Graphs., , и . WALCOM, том 5431 из Lecture Notes in Computer Science, стр. 262-273. Springer, (2009)