Author of the publication

GBD Threshold Cryptography with an Application to RSA Key Recovery.

, , , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 394-405. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient semi-supervised SVM for anomaly detection., and . IJCNN, page 2843-2850. IEEE, (2017)Information-theoretic Source Code Vulnerability Highlighting., , , , , and . IJCNN, page 1-8. IEEE, (2021)Deep Domain Adaptation for Vulnerable Code Function Identification., , , , , , , and . IJCNN, page 1-8. IEEE, (2019)Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness., , , , , , , , and . AAAI, page 14783-14791. AAAI Press, (2023)Exploiting Certified Defences to Attack Randomised Smoothing., , , , and . CoRR, (2023)Elliptic Curve Based Password Authenticated Key Exchange Protocols., , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 487-501. Springer, (2001)An elliptic curve authenticated key exchange based approach to key infrastructure., , , and . KES, page 513-517. IEEE, (1999)BAIT: Benchmarking (Embedding) Architectures for Interactive Theorem-Proving., , , , and . AAAI, page 10607-10615. AAAI Press, (2024)Translation of Rights Expressions., and . ACSW, volume 44 of CRPIT, page 137-144. Australian Computer Society, (2005)Code Pointer Network for Binary Function Scope Identification., , , , , , and . IJCNN, page 1-7. IEEE, (2020)