From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

(Hierarchical Identity-Based) Threshold Ring Signatures., и . IACR Cryptology ePrint Archive, (2006)Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups., , , и . ESAS, том 3313 из Lecture Notes in Computer Science, стр. 82-94. Springer, (2004)Teaching for Conceptual Change in Security Awareness., и . IEEE Secur. Priv., 6 (6): 67-69 (2008)A Mobile Agent Clone Detection System with Itinerary Privacy., и . WETICE, стр. 68-76. IEEE Computer Society, (2002)A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection., и . WETICE, стр. 55-56. IEEE Computer Society, (2002)More Compact E-Cash with Efficient Coin Tracing.. IACR Cryptology ePrint Archive, (2005)Fast and Proven Secure Blind Identity-Based Signcryption from Pairings., и . CT-RSA, том 3376 из Lecture Notes in Computer Science, стр. 305-322. Springer, (2005)On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST., , , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 34-46. Springer, (2003)Custodian-Hiding Verifiable Encryption., , и . WISA, том 3325 из Lecture Notes in Computer Science, стр. 51-64. Springer, (2004)Optical orthogonal codes: Design, analysis, and applications., , и . IEEE Trans. Inf. Theory, 35 (3): 595-604 (1989)