From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the (Im)possibility of Blind Message Authentication Codes., , и . CT-RSA, том 3860 из Lecture Notes in Computer Science, стр. 262-279. Springer, (2006)Transitive Signatures: New Schemes and Proofs., и . IACR Cryptology ePrint Archive, (2004)On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study., , и . SEC, том 175 из IFIP Conference Proceedings, стр. 361-370. Kluwer, (2000)Multi-signatures in the plain public-Key model and a general forking lemma., и . CCS, стр. 390-399. ACM, (2006)Compact Multi-signatures for Smaller Blockchains., , и . ASIACRYPT (2), том 11273 из Lecture Notes in Computer Science, стр. 435-464. Springer, (2018)Second Price Auctions - A Case Study of Secure Distributed Computating., , , и . DAIS, том 198 из IFIP Conference Proceedings, стр. 217-228. Kluwer, (2001)Privacy-enhanced access control in primelife.. Digital Identity Management, стр. 1-2. ACM, (2010)Pixel: Multi-signatures for Consensus., , , и . USENIX Security Symposium, стр. 2093-2110. USENIX Association, (2020)Identity-Based Traitor Tracing., , , , , и . Public Key Cryptography, том 4450 из Lecture Notes in Computer Science, стр. 361-376. Springer, (2007)Transitive Signatures Based on Factoring and RSA., и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 397-414. Springer, (2002)