From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enterprise Privacy Authorization Language (EPAL), , , , и . IBM Research, Rüschlikon, (2003)On the Existence of 3-Round Zero-Knowledge Protocols., и . CRYPTO, том 1462 из Lecture Notes in Computer Science, стр. 408-423. Springer, (1998)Secure Obfuscation for Encrypted Signatures.. EUROCRYPT, том 6110 из Lecture Notes in Computer Science, стр. 92-112. Springer, (2010)Zero-Knowledge and Code Obfuscation.. ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 443-457. Springer, (2000)Ciphertext-Auditable Public Key Encryption., и . IWSEC, том 4266 из Lecture Notes in Computer Science, стр. 308-321. Springer, (2006)A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption., и . IWSEC, том 4752 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2007)XML document security based on provisional authorization., и . ACM Conference on Computer and Communications Security, стр. 87-96. ACM, (2000)Static vs. Dynamic Validation of BSP Conformance., , , , , и . ICWS, стр. 919-927. IEEE Computer Society, (2009)A Relationship between One-Wayness and Correlation Intractability., и . Public Key Cryptography, том 1560 из Lecture Notes in Computer Science, стр. 82-96. Springer, (1999)XML access control using static analysis., , , и . ACM Conference on Computer and Communications Security, стр. 73-84. ACM, (2003)