From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Key Establishment Problem., и . FOSAD, том 2946 из Lecture Notes in Computer Science, стр. 44-90. Springer, (2002)Steganography Using Modern Arts., и . IFIP TCS, том 1872 из Lecture Notes in Computer Science, стр. 140-151. Springer, (2000)A Bluetooth-Based JXME Infrastructure., и . OTM Conferences (1), том 4803 из Lecture Notes in Computer Science, стр. 667-682. Springer, (2007)Dynamic Multi-threshold Metering Schemes., , , и . Selected Areas in Cryptography, том 2012 из Lecture Notes in Computer Science, стр. 130-143. Springer, (2000)A flaw in a self-healing key distribution scheme., , и . ITW, стр. 163-166. IEEE, (2003)Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution., , и . Theor. Comput. Sci., 200 (1-2): 313-334 (1998)Randomness in Distributed Protocols., , и . ICALP, том 820 из Lecture Notes in Computer Science, стр. 568-579. Springer, (1994)A Novel Approach to Proactive Password Checking., , , и . InfraSec, том 2437 из Lecture Notes in Computer Science, стр. 30-39. Springer, (2002)A Lightweight Framework forWeb Services Invocation over Bluetooth., , , и . ICWS, стр. 331-338. IEEE Computer Society, (2006)Efficient Sharing of Many Secrets., , и . STACS, том 665 из Lecture Notes in Computer Science, стр. 692-703. Springer, (1993)