Author of the publication

A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries.

, , , , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 465-479 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Design for Secure Multiparty Computation over Non-Abelian Groups., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 37-53. Springer, (2008)An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels., , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 17-34. Springer, (2007)Attack Simulation based Software Protection Assessment Method with Petri Net., , , , , , and . Int. J. Cyber Situational Aware., 1 (1): 152-181 (2016)Privacy-Preserving Distributed Set Intersection., , and . IACR Cryptology ePrint Archive, (2007)Rateless Codes for the Multicast Stream Authentication Problem., and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 136-151. Springer, (2006)Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes., and . CANS, volume 5339 of Lecture Notes in Computer Science, page 196-213. Springer, (2008)Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 167-181. Springer, (2007)A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries., , , , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 465-479 (2012)Authentication of Digital Streams., , and . IEEE Trans. Inf. Theory, 57 (9): 6285-6303 (2011)An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 259-275. Springer, (2011)