From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-interactive conference key distribution and its applications., и . AsiaCCS, стр. 271-282. ACM, (2008)On the Optimality of Keyless Authentication in a Noisy Model.. IEEE Trans. Inf. Forensics Secur., 10 (6): 1250-1261 (2015)A One-way Secret Key Agreement with Security Against Active Adversaries., , и . ISIT, стр. 2314-2319. IEEE, (2023)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , и . IEEE Access, (2018)A New Conditionally Anonymous Ring Signature., , и . COCOON, том 6842 из Lecture Notes in Computer Science, стр. 479-491. Springer, (2011)An Efficient Deniable Key Exchange Protocol (Extended Abstract)., и . Financial Cryptography, том 5143 из Lecture Notes in Computer Science, стр. 47-52. Springer, (2008)A Round and Communication Efficient Secure Ranking Protocol., и . CT-RSA, том 3860 из Lecture Notes in Computer Science, стр. 350-364. Springer, (2006)Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences., , , и . ISIT, стр. 123. IEEE, (2004)Message Authentication Code over a wiretap channel., , и . ISIT, стр. 2301-2305. IEEE, (2015)On Optimal Secure Message Transmission by Public Discussion., , , и . IEEE Trans. Inf. Theory, 57 (1): 572-585 (2011)