From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deciding knowledge in security protocols under some e-voting theories., , и . RAIRO Theor. Informatics Appl., 45 (3): 269-299 (2011)A secure electronic voting protocol with a simple ballot's encryption function., , и . Int. J. Secur. Networks, 13 (1): 10-26 (2018)Co-location Resistant Strategy with Full Resources Optimization., , и . CCSW, стр. 3-10. ACM, (2016)Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling., , , и . Trans. Petri Nets Other Model. Concurr., (2015)Resource consumption trade-off for reducing hotspot migration in modern data centres., , и . Int. J. Grid Util. Comput., 12 (3): 332-346 (2021)Incoercible Fully-Remote Electronic Voting Protocol., , и . NETYS, том 10299 из Lecture Notes in Computer Science, стр. 355-369. (2017)A Distributed Multi-key Generation Protocol with a New Complaint Management Strategy., , и . EMCIS, том 464 из Lecture Notes in Business Information Processing, стр. 150-164. Springer, (2022)Reviewing the Role of Secret Sharing Schemes in Electronic Payment Protocols., , и . EMCIS (1), том 501 из Lecture Notes in Business Information Processing, стр. 52-60. Springer, (2023)Linking Algebraic Observational Equivalence and Bisimulation., и . Developments in Language Theory, том 6224 из Lecture Notes in Computer Science, стр. 76-87. Springer, (2010)Distributed key generation protocol with a new complaint management strategy., , и . Secur. Commun. Networks, 9 (17): 4585-4595 (2016)