From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threshold Attribute-Based Signcryption., , и . SCN, том 6280 из Lecture Notes in Computer Science, стр. 154-171. Springer, (2010)Breaking and Mending Resilient Mix-Nets., и . Privacy Enhancing Technologies, том 2760 из Lecture Notes in Computer Science, стр. 66-80. Springer, (2003)A Virtual Wiretap Channel for Secure Message Transmission., , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 171-192. Springer, (2016)A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases., , , и . Australasian Database Conference, том 17 из Australian Computer Science Communications, (1995)Three Systems for Threshold Generation of Authenticators.. Des. Codes Cryptogr., 13 (3): 299-312 (1998)Conditionally Secure Secret Sharing Schemes with Disenrollment Capability., , и . ACM Conference on Computer and Communications Security, стр. 89-95. ACM, (1994)Characterization of Optimal Authentication Codes with Arbitration., , , и . ACISP, том 1587 из Lecture Notes in Computer Science, стр. 303-313. Springer, (1999)A One-Round Key Agreement Protocol with Information-Theoretic Security., , и . CoRR, (2019)Three Systems for Shared Generation of Authenticators.. COCOON, том 1090 из Lecture Notes in Computer Science, стр. 401-410. Springer, (1996)Transport Layer Identification of Skype Traffic., , , и . ICOIN, том 5200 из Lecture Notes in Computer Science, стр. 465-481. Springer, (2007)