Author of the publication

Short Vertex Disjoint Paths and Multiconnectivity in Random Graphs: Reliable Network Computing.

, , , and . ICALP, volume 820 of Lecture Notes in Computer Science, page 508-519. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptively secure non-interactive threshold cryptosystems., and . Theor. Comput. Sci., (2013)Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy., and . Secure Electronic Voting, volume 7 of Advances in Information Security, Springer, (2003)Fast Algorithms for Edge-Coloring Planar Graphs., and . J. Algorithms, 10 (1): 35-51 (1989)Friendly Observers Ease Off-Line E-Cash., , and . CARDIS, volume 180 of IFIP Conference Proceedings, page 3-18. Kluwer, (2000)The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution., , and . IAW, page 288-291. IEEE, (2003)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , and . Cryptology and Network Security, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)Adaptive Concurrent Non-Malleability with Bare Public-Keys., , and . IACR Cryptology ePrint Archive, (2010)Threshold Cryptosystems Based on Factoring., and . IACR Cryptology ePrint Archive, (2001)"Metaproofs" (and their Cryptographic Applications)., and . IACR Cryptology ePrint Archive, (2012)Cryptographic Hardness based on the Decoding of Reed-Solomon Codes., and . IACR Cryptology ePrint Archive, (2007)