From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of the RSA-CEGD protocol, , , и . CoRR, (2008)A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma., , , и . International Conference on Internet Computing, стр. 37-43. CSREA Press, (2010)Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management., , , и . IET Inf. Secur., 10 (2): 60-68 (2016)A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol., , , и . ICCSA (4), том 3483 из Lecture Notes in Computer Science, стр. 1309-1318. Springer, (2005)POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations., , , , и . MobiQuitous, том 104 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 224-227. Springer, (2011)Anonymous authentication for privacy-preserving IoT target-driven applications., , , и . Comput. Secur., (2013)L-PEP: A Logic to Reason about Privacy-Enhancing Cryptography Protocols., , , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2010)Nature-Inspired Synthesis of Rational Protocols., , , и . PPSN, том 5199 из Lecture Notes in Computer Science, стр. 981-990. Springer, (2008)Towards Automated Design of Multi-party Rational Exchange Security Protocols., , , и . Web Intelligence/IAT Workshops, стр. 387-390. IEEE Computer Society, (2007)A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs., , , и . Web Intelligence, стр. 682-685. IEEE Computer Society, (2010)