From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries., и . Public Key Cryptography, том 3386 из Lecture Notes in Computer Science, стр. 172-183. Springer, (2005)Conditional Oblivious Cast., и . Public Key Cryptography, том 3958 из Lecture Notes in Computer Science, стр. 443-457. Springer, (2006)Conditional proxy re-encryption secure against chosen-ciphertext attack., , , , и . AsiaCCS, стр. 322-332. ACM, (2009)Keyed Non-parametric Hypothesis Tests., , , , и . NSS, том 11928 из Lecture Notes in Computer Science, стр. 632-645. Springer, (2019)Identity-Based Proxy Re-encryption Without Random Oracles., и . ISC, том 4779 из Lecture Notes in Computer Science, стр. 189-202. Springer, (2007)Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries., и . IACR Cryptology ePrint Archive, (2004)A Threshold GQ Signature Scheme., , и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 137-150. Springer, (2003)Distributed Key Generation as a Component of an Integrated Protocol., и . ICICS, том 2513 из Lecture Notes in Computer Science, стр. 411-421. Springer, (2002)PreCrime to the rescue: defeating mobile malware one-step ahead., , , , , и . APSys, стр. 5:1-5:7. ACM, (2014)Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes., и . J. Inf. Sci. Eng., 25 (5): 1465-1483 (2009)