From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Approximating Max-Min Fair Rates via Distributed Local Scheduling with Partial Information., , и . INFOCOM, стр. 928-936. IEEE Computer Society, (1996)Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack., и . The New Codebreakers, том 9100 из Lecture Notes in Computer Science, стр. 243-255. Springer, (2016)"Metaproofs" (and their Cryptographic Applications)., и . IACR Cryptology ePrint Archive, (2012)Cryptographic Hardness based on the Decoding of Reed-Solomon Codes., и . IACR Cryptology ePrint Archive, (2007)Adaptive Concurrent Non-Malleability with Bare Public-Keys., , и . IACR Cryptology ePrint Archive, (2010)Threshold Cryptosystems Based on Factoring., и . IACR Cryptology ePrint Archive, (2001)Cryptography and decoding Reed-Solomon codes as a hard problem., и . ICITS, стр. 48. IEEE, (2005)Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions., , и . ICALP, том 55 из LIPIcs, стр. 30:1-30:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Access regulation mechanism for switch-based LAN., и . Comput. Networks, 31 (5): 505-518 (1999)Special Issue on Advanced Persistent Threat., , , и . Future Gener. Comput. Syst., (2018)