From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Combating Click Fraud via Premium Clicks., , и . USENIX Security Symposium, USENIX Association, (2007)Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems., , , и . CollaborateCom, IEEE Computer Society / ICST, (2006)Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware., , и . DASC, стр. 37-44. IEEE Computer Society, (2006)Mix and Match: Secure Function Evaluation via Ciphertexts., и . ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 162-177. Springer, (2000)Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System., и . Financial Cryptography, том 1318 из Lecture Notes in Computer Science, стр. 217-238. Springer, (1997)Phishing IQ Tests Measure Fear, Not Ability., , , , и . Financial Cryptography, том 4886 из Lecture Notes in Computer Science, стр. 362-366. Springer, (2007)Financial Instruments in Recommendation Mechanisms.. Financial Cryptography, том 2357 из Lecture Notes in Computer Science, стр. 31-43. Springer, (2002)Coercion-Resistant Electronic Elections., , и . Towards Trustworthy Elections, том 6000 из Lecture Notes in Computer Science, стр. 37-63. Springer, (2010)Implicit Authentication through Learning User Behavior., , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 99-113. Springer, (2010)Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function., , и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 280-305. Springer, (1997)