From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protocols Using Anonymous Connections: Mobile Applications., , и . Security Protocols Workshop, том 1361 из Lecture Notes in Computer Science, стр. 13-23. Springer, (1997)Mechanizing Unity.. Programming Concepts and Methods, стр. 387-414. North-Holland, (1990)A Mechanization of Unity in PC-NQTHM-92.. J. Autom. Reason., 23 (3-4): 445-498 (1999)Private Web Browsing., , и . J. Comput. Secur., 5 (3): 237-248 (1997)Beyond Cryptographic Conditional Access., и . Smartcard, USENIX Association, (1999)Hiding Routing Information., , и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 137-150. Springer, (1996)Functional Instantiation in First-Order Logic., , , и . Artificial and Mathematical Theory of Computation, стр. 7-26. Academic Press / Elsevier, (1991)Towards a model of storage jamming., и . CSFW, стр. 176-. IEEE Computer Society, (1996)Conditional Access Concepts and Principles., и . Financial Cryptography, том 1648 из Lecture Notes in Computer Science, стр. 158-172. Springer, (1999)Publicly Verifiable Lotteries: Applications of Delaying Functions., и . Financial Cryptography, том 1465 из Lecture Notes in Computer Science, стр. 214-226. Springer, (1998)