From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Friendly Observers Ease Off-Line E-Cash., , и . CARDIS, том 180 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (2000)The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution., , и . IAW, стр. 288-291. IEEE, (2003)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , и . Cryptology and Network Security, том 4856 из Lecture Notes in Computer Science, стр. 265-281. Springer, (2007)Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption., , и . ASIACRYPT (2), том 12492 из Lecture Notes in Computer Science, стр. 98-128. Springer, (2020)Threshold Cryptosystems Based on Factoring., и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 192-205. Springer, (2002)On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications., , , и . SSS, том 13046 из Lecture Notes in Computer Science, стр. 350-364. Springer, (2021)End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage., , , и . USENIX Security Symposium, стр. 2353-2370. USENIX Association, (2022)On the Security of ElGamal Based Encryption., и . Public Key Cryptography, том 1431 из Lecture Notes in Computer Science, стр. 117-134. Springer, (1998)Fast Algorithms for Edge-Coloring Planar Graphs., и . J. Algorithms, 10 (1): 35-51 (1989)Efficient and Secure Authenticated Key Exchange Using Weak Passwords, , и . (2006)http://www.cs.umd.edu/~jkatz/papers/password.pdf.