From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multiparty Computation from El Gamal/Paillier Conversion., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 137-146 (2009)Privacy-Preserving Decision Tree Learning with Boolean Target Class., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2291-2300 (2015)Identification of incompletely specified multiple-valued Kleenean functions., , , и . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks., , , , и . Int. J. Inf. Sec., 19 (3): 245-255 (2020)Electronic Auctions with Private Bids., , и . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 901-913. Springer, (2017)Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks., , , , и . DSC, стр. 1-8. IEEE, (2018)How Much is Risk Increased by Sharing Credential in Group?, , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 103-117. Springer, (2017)Secure Asymmetric Watermark Detection Without Secret of Modified Pixels., и . WISA, том 3786 из Lecture Notes in Computer Science, стр. 165-178. Springer, (2005)How Many Malicious Scanners Are in the Internet?, и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 381-390. Springer, (2006)