From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the transferability of private signatures.. Inf. Sci., 179 (11): 1647-1656 (2009)Kd-trees and the real disclosure risks of large statistical databases., , и . Inf. Fusion, 13 (4): 260-273 (2012)On the generic construction of identity-based signatures with additional properties., , и . Adv. in Math. of Comm., 4 (4): 453-483 (2010)How to Group Attributes in Multivariate Microaggregation., , и . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 16 (Supplement-1): 121-138 (2008)Some Applications of Threshold Signature Schemes to Distributed Protocols., , и . IACR Cryptology ePrint Archive, (2002)Forking Lemmas in the Ring Signatures' Scenario., и . IACR Cryptology ePrint Archive, (2003)A Generic Construction for Token-Controlled Public Key Encryption., и . Financial Cryptography, том 4107 из Lecture Notes in Computer Science, стр. 177-190. Springer, (2006)Fully Secure Threshold Unsigncryption., , и . ProvSec, том 6402 из Lecture Notes in Computer Science, стр. 261-278. Springer, (2010)Additively Homomorphic Encryption with d-Operand Multiplications., , и . CRYPTO, том 6223 из Lecture Notes in Computer Science, стр. 138-154. Springer, (2010)Ring Signature Schemes for General Ad-Hoc Access Structures., и . ESAS, том 3313 из Lecture Notes in Computer Science, стр. 54-65. Springer, (2004)