Author of the publication

A Password-Based Authenticator: Security Proof and Applications.

, , , , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 388-401. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient semi-supervised SVM for anomaly detection., and . IJCNN, page 2843-2850. IEEE, (2017)Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning., , , , , and . CoRR, (2021)Exploiting Certified Defences to Attack Randomised Smoothing., , , , and . CoRR, (2023)CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 438-451 (2022)Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness., , , , , , , , and . AAAI, page 14783-14791. AAAI Press, (2023)Information-theoretic Source Code Vulnerability Highlighting., , , , , and . IJCNN, page 1-8. IEEE, (2021)Deep Domain Adaptation for Vulnerable Code Function Identification., , , , , , , and . IJCNN, page 1-8. IEEE, (2019)Towards Attention Based Vulnerability Discovery Using Source Code Representation., , and . ICANN (4), volume 11730 of Lecture Notes in Computer Science, page 731-746. Springer, (2019)GBD Threshold Cryptography with an Application to RSA Key Recovery., , , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 394-405. Springer, (2005)Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity., , , , and . NeurIPS, (2022)