From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of Anonymity of Practical Anonymous Communication Networks., , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 13-26. Springer, (2003)A New Authorization Model and its Mechanism Using Service Paths in Open Distributed Environments., и . DAIS, Chapman & Hall, (1997)Mobile Agent Security with Efficient Oblivious Transfer., , и . SECRYPT, стр. 299-304. INSTICC Press, (2007)An Agent-Based Model of Anonymous Communication Protocols., , и . WETICE, стр. 177-182. IEEE Computer Society, (2001)A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length., , , , и . ISPEC, том 5451 из Lecture Notes in Computer Science, стр. 13-23. Springer, (2009)Software Obfuscation on a Theoretical Basis and Its Implementation., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 176-186 (2003)Hidden Credential Retrieval without Random Oracles., , и . WISA, том 6513 из Lecture Notes in Computer Science, стр. 160-174. Springer, (2010)Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 89-103. Springer, (2003)Ideal Secret Sharing Schemes with Share Selectability., , , , и . ICICS, том 7043 из Lecture Notes in Computer Science, стр. 143-157. Springer, (2011)A Novel Hybrid IP Traceback Scheme with Packet Counters., , и . IDCS, том 7646 из Lecture Notes in Computer Science, стр. 71-84. Springer, (2012)