From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Web Forms and Untraceable DDoS Attacks, и . Network Security, XXIII, Springer, (2010)Designing ethical phishing experiments: a study of (ROT13) rOnl query features., и . WWW, стр. 513-522. ACM, (2006)Efficient attribute authentication with applications to ad hoc networks., и . Vehicular Ad Hoc Networks, стр. 38-46. ACM, (2004)Coercion-Resistant Electronic Elections., , и . Towards Trustworthy Elections, том 6000 из Lecture Notes in Computer Science, стр. 37-63. Springer, (2010)Cryptographic Randomized Response Techniques., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 425-438. Springer, (2004)Implicit Authentication through Learning User Behavior., , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 99-113. Springer, (2010)An optimally robust hybrid mix network., и . PODC, стр. 284-292. ACM, (2001)Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function., , и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 280-305. Springer, (1997)Proprietary Certificates., , и . CT-RSA, том 2271 из Lecture Notes in Computer Science, стр. 164-181. Springer, (2002)Mix and Match: Secure Function Evaluation via Ciphertexts., и . ASIACRYPT, том 1976 из Lecture Notes in Computer Science, стр. 162-177. Springer, (2000)