Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Schemes for Visual Cryptography., , and . Des. Codes Cryptogr., 24 (3): 255-278 (2001)On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines., , , and . Appl. Soft Comput., 13 (1): 615-627 (2013)On the protection of consumer genomic data in the Internet of Living Things., , , , , and . Comput. Secur., (2018)Unconditionally secure key assignment schemes., , and . Discret. Appl. Math., 154 (2): 234-252 (2006)On the Information Rate of Secret Sharing Schemes (Extended Abstract)., , , and . CRYPTO, volume 740 of Lecture Notes in Computer Science, page 148-167. Springer, (1992)Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 366-377. Springer, (1990)Secret Sharing and Perfect Zero Knowledge., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 73-84. Springer, (1993)Fully Dynamic Secret Sharing Schemes., , , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 110-125. Springer, (1993)Non-Interactive Zero-Knowledge with Preprocessing., , and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 269-282. Springer, (1988)Multi-Secret Sharing Schemes., , , , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 150-163. Springer, (1994)