From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A General Decomposition Construction for Incomplete Secret Sharing Schemes., , и . Des. Codes Cryptogr., 15 (3): 301-321 (1998)Constructing Key Assignment Schemes from Chain Partitions., , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 130-145. Springer, (2010)Localised multisecret sharing., , , и . Cryptogr. Commun., 9 (5): 581-597 (2017)Threshold MACs., , , , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 237-252. Springer, (2002)A Viable Grid Marketplace., и . ISPA, стр. 427-432. IEEE Computer Society, (2010)A Combinatorial Model of Interference in Frequency Hopping Schemes., , и . CoRR, (2015)Cumulative Arrays and Geometric Secret Sharing Schemes., и . AUSCRYPT, том 718 из Lecture Notes in Computer Science, стр. 48-55. Springer, (1992)Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure., и . WISTP, том 5746 из Lecture Notes in Computer Science, стр. 143-152. Springer, (2009)SoK: Anonymous Credentials., , , и . SSR, том 13895 из Lecture Notes in Computer Science, стр. 129-151. Springer, (2023)Mutually Trusted Authority-Free Secret Sharing Schemes., , и . J. Cryptol., 10 (4): 261-289 (1997)