From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Self-Testing/Correcting for Polynomials and for Approximate Functions, , , , и . STOC, стр. 32-42. ACM, (1991)Checking approximate computations over the reals., , , и . STOC, стр. 786-795. ACM, (1993)Selection in the Presence of Noise: The Design of Playoff Systems., , , , и . SODA, стр. 564-572. ACM/SIAM, (1994)Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change., , и . SODA, стр. 457-466. ACM/SIAM, (1995)Efficient and Fresh Cerification., , и . Public Key Cryptography, том 1751 из Lecture Notes in Computer Science, стр. 342-353. Springer, (2000)Witness-Based Cryptographic Program Checking and Robust Function Sharing., , и . STOC, стр. 499-508. ACM, (1996)Witness-Based Cryptographic Program Checking and Applications (an Announcement)., , и . PODC, стр. 211. ACM, (1996)Codes for Interactive Authentication., и . CRYPTO, том 773 из Lecture Notes in Computer Science, стр. 355-367. Springer, (1993)Checking Properties of Polynomials (Extended Abstract)., , , и . ICALP, том 1256 из Lecture Notes in Computer Science, стр. 203-213. Springer, (1997)On the Cryptographic Value of The qth Root Problem., , , и . ICICS, том 1726 из Lecture Notes in Computer Science, стр. 135-142. Springer, (1999)