From post

Information Leakage Due to Revealing Randomly Selected Bits.

, , и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 325-341. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generalized information theory for hints., , и . Int. J. Approx. Reason., 54 (1): 228-251 (2013)NoCry: No More Secure Encryption Keys for Cryptographic Ransomware., , и . ETAA@ESORICS, том 11967 из Lecture Notes in Computer Science, стр. 69-85. Springer, (2019)Special track on computer security., и . SAC, стр. 304-305. ACM, (2005)Remodelling the Attacker in Voting Protocols (Transcript of Discussion).. Security Protocols Workshop, том 6615 из Lecture Notes in Computer Science, стр. 235-240. Springer, (2008)Putting the Human Back in Voting Protocols., и . Security Protocols Workshop, том 5087 из Lecture Notes in Computer Science, стр. 13-19. Springer, (2006)A Practical Voter-Verifiable Election Scheme., , и . ESORICS, том 3679 из Lecture Notes in Computer Science, стр. 118-139. Springer, (2005)A Model for System-Based Analysis of Voting Systems., , и . Security Protocols Workshop, том 5964 из Lecture Notes in Computer Science, стр. 114-130. Springer, (2007)Auditable PAKEs: Approaching Fair Exchange Without a TTP., и . Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 278-297. Springer, (2017)Information Leakage Due to Revealing Randomly Selected Bits., , и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 325-341. Springer, (2015)Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)., , , и . Dagstuhl Manifestos, 5 (1): 25-37 (2015)