From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-party generation of DSA signatures., и . Int. J. Inf. Sec., 2 (3-4): 218-239 (2004)To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings., , , , и . Proc. Priv. Enhancing Technol., 2017 (4): 119-137 (2017)Bounded vector signatures and their applications., , и . AsiaCCS, стр. 277-285. ACM, (2011)Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols., , , , , и . ACM Conference on Computer and Communications Security, стр. 2387-2402. ACM, (2019)BEAT: Asynchronous BFT Made Practical., , и . ACM Conference on Computer and Communications Security, стр. 2028-2041. ACM, (2018)Authentication Metric Analysis and Design., и . ACM Trans. Inf. Syst. Secur., 2 (2): 138-158 (1999)Efficient and Safe Network Updates with Suffix Causal Consistency., , и . EuroSys, стр. 23:1-23:15. ACM, (2019)Discovering access-control misconfigurations: new approaches and evaluation methodologies., , , и . CODASPY, стр. 95-104. ACM, (2012)Detecting and resolving policy misconfigurations in access-control systems., , и . SACMAT, стр. 185-194. ACM, (2008)Fair Exchange with a Semi-Trusted Third Party (extended abstract)., и . ACM Conference on Computer and Communications Security, стр. 1-5. ACM, (1997)