From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum information theoretical analysis of various constructions for quantum secret sharing., , и . ISIT, стр. 1598-1602. IEEE, (2005)RFID-Tags for Anti-counterfeiting., и . CT-RSA, том 3860 из Lecture Notes in Computer Science, стр. 115-131. Springer, (2006)Client-Server Trade-Offs in Secure Computation., и . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Private Person Authentication in an Ambient World., и . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Hardware Intrinsic Security.. RFIDSec, том 6370 из Lecture Notes in Computer Science, стр. 123. Springer, (2010)Visual Crypto Displays Enabling Secure Communications., , , , и . SPC, том 2802 из Lecture Notes in Computer Science, стр. 271-284. Springer, (2003)Practical Biometric Authentication with Template Protection., , , , , и . AVBPA, том 3546 из Lecture Notes in Computer Science, стр. 436-446. Springer, (2005)Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method., , , , и . ISIT, стр. 499-503. IEEE, (2006)Information-theoretic analysis of coating PUFs., , , и . IACR Cryptology ePrint Archive, (2006)An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes., , , и . IACR Cryptology ePrint Archive, (2002)