Author of the publication

Study on the Technology of the Secure Computation in the Different Adversarial Models.

, , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Technology of the Secure Computation in the Different Adversarial Models., , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)A Secure Protocol for Point-Segment Position Problem., , , and . WISM, volume 6318 of Lecture Notes in Computer Science, page 212-219. Springer, (2010)An approach for secure-communication between XEN virtual machines., , and . CCIS, page 283-286. IEEE, (2012)A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model., , , and . IPTC, page 5-8. IEEE Computer Society, (2011)