From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Security of Abreast-DM in the Ideal Cipher Model., и . IACR Cryptology ePrint Archive, (2009)Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005., , , и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 262-270. Springer, (2006)Tree-Based Key Distribution Patterns., и . Selected Areas in Cryptography, том 3897 из Lecture Notes in Computer Science, стр. 189-204. Springer, (2005)Deterministic Key Predistribution Schemes for Distributed Sensor Networks., и . Selected Areas in Cryptography, том 3357 из Lecture Notes in Computer Science, стр. 294-307. Springer, (2004)Evolution of Friendship: a case study of MobiClique., , , и . Conf. Computing Frontiers, стр. 267-270. ACM, (2017)UNRES: a united-residue force field for energy-based prediction of protein structure - orgin and significance of multibody terms., , , , , , , , , и 1 other автор(ы). RECOMB, стр. 193-200. ACM, (2000)A Comparative Analysis of Distributed Ledger Technologies for Smart Contract Development., , , , , , и . PIMRC, стр. 1-6. IEEE, (2019)Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes., , , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 319-341. Springer, (2015)New Constructions of MACs from (Tweakable) Block Ciphers., , и . IACR Trans. Symmetric Cryptol., 2017 (2): 27-58 (2017)Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation., и . IEEE Trans. Inf. Theory, 58 (9): 6165-6182 (2012)