From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deniable Secret Handshake Protocol - Revisited., , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 1266-1278. Springer, (2019)Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters., , , , и . ICISS, том 11281 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2018)XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra., и . ICICS, том 8958 из Lecture Notes in Computer Science, стр. 230-242. Springer, (2014)Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings., , , , и . ICISS, том 12553 из Lecture Notes in Computer Science, стр. 198-217. Springer, (2020)AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties., , и . NSS, том 12570 из Lecture Notes in Computer Science, стр. 292-308. Springer, (2020)Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing., , и . CANS, том 11829 из Lecture Notes in Computer Science, стр. 291-307. Springer, (2019)Password Protected Secret Sharing from Lattices., , , и . ACNS (1), том 12726 из Lecture Notes in Computer Science, стр. 442-459. Springer, (2021)Verifiable E-Voting with Resistance against Physical Forced Abstention Attack., и . IWBIS, стр. 85-90. IEEE, (2019)3-Party Adversarial Cryptography., , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 247-258. Springer, (2020)Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing., , и . CANS, том 14342 из Lecture Notes in Computer Science, стр. 468-493. Springer, (2023)