From post

Authentication of transit flows and k-siblings one-time signature.

, и . Communications and Multimedia Security, том 228 из IFIP Conference Proceedings, стр. 41-55. Kluwer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Case Study of User-Level Spam Filtering., и . AISC, том 149 из CRPIT, стр. 67-75. Australian Computer Society, (2014)Multi-party computation with conversion of secret sharing., , и . Des. Codes Cryptogr., 62 (3): 259-272 (2012)A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents., , и . CSCWD, стр. 330-337. IEEE, (2001)Rotational Cryptanalysis of ARX Revisited., , , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 519-536. Springer, (2015)Privacy Enhancements for Hardware-Based Security Modules., , и . ICETE (Selected Papers), том 130 из Communications in Computer and Information Science, стр. 224-236. Springer, (2009)A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications., , , , и . IEEE Trans. Veh. Technol., 70 (9): 9306-9319 (2021)ANS-based compression and encryption with 128-bit security., , , , , , и . Int. J. Inf. Sec., 21 (5): 1051-1067 (2022)Permutation polynomials of the form (xp-x+delta)s+L(x)., , , и . Finite Fields Their Appl., 14 (2): 482-493 (2008)Cryptanalysis of LASH., , , , , , и . IACR Cryptology ePrint Archive, (2007)Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function., , , , и . IACR Cryptology ePrint Archive, (2014)