From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Digital signatures for mobile users., и . CCECE, стр. 1-5. IEEE, (2014)Using Mediated Identity-Based Cryptography to Support Role-Based Access Control., , и . ISC, том 3225 из Lecture Notes in Computer Science, стр. 245-256. Springer, (2004)Good S-Boxes Are Easy To Find., и . CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 612-615. Springer, (1989)DLAS: Data Location Assurance Service for cloud computing environments., и . PST, стр. 225-228. IEEE Computer Society, (2012)Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition., , , , , и . PST, стр. 87-92. IEEE, (2011)Security-Related Comments Regarding McEliece's Public-Key Cryptosystem., и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 224-228. Springer, (1987)Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities., , и . PST, стр. 219-223. (2004)On Characterizing and Measuring Out-of-Band Covert Channels., и . IH&MMSec, стр. 43-54. ACM, (2015)On The Security of Key Derivation Functions., , , и . ISC, том 3225 из Lecture Notes in Computer Science, стр. 134-145. Springer, (2004)On Immunity Against Biham and Shamir's ``Differential Cryptanalysis''.. Inf. Process. Lett., 41 (2): 77-80 (1992)