From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Per-session security: Password-based cryptography revisited., , , и . J. Comput. Secur., 27 (1): 75-111 (2019)Anonymity-Preserving Public-Key Encryption: A Constructive Approach., , , , и . Privacy Enhancing Technologies, том 7981 из Lecture Notes in Computer Science, стр. 19-39. Springer, (2013)Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric., , , и . CANS, том 13099 из Lecture Notes in Computer Science, стр. 435-459. Springer, (2021)The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3., и . CRYPTO (1), том 9814 из Lecture Notes in Computer Science, стр. 247-276. Springer, (2016)Synchrony amplification., и . ISIT, стр. 1583-1587. IEEE, (2012)Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC., , , , и . TCC (3), том 12552 из Lecture Notes in Computer Science, стр. 1-30. Springer, (2020)Toward an algebraic theory of systems., , , , и . Theor. Comput. Sci., (2018)Robust Authenticated Encryption and the Limits of Symmetric Cryptography., , , , и . IMACC, том 9496 из Lecture Notes in Computer Science, стр. 112-129. Springer, (2015)On Composable Security for Digital Signatures., , и . Public Key Cryptography (1), том 10769 из Lecture Notes in Computer Science, стр. 494-523. Springer, (2018)Privacy-preserving auditable token payments in a permissioned blockchain system., , , , , и . AFT, стр. 255-267. ACM, (2020)