From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Multiple Key Cipher and an Improved Voting Scheme.. EUROCRYPT, том 434 из Lecture Notes in Computer Science, стр. 617-625. Springer, (1989)Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems., , и . CANS, том 4301 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2006)A Three Phased Schema for Sealed Bid Auction System Design., , и . ACISP, том 1841 из Lecture Notes in Computer Science, стр. 412-426. Springer, (2000)Secure Selection Protocols., , и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 132-146. Springer, (1999)Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks., , , и . ACISP, том 2119 из Lecture Notes in Computer Science, стр. 334-343. Springer, (2001)Towards a Secure Human-and-Computer Mutual Authentication Protocol., , , и . AISC, том 125 из CRPIT, стр. 39-46. Australian Computer Society, (2012)ID-based One-pass Authenticated Key Establishment., , и . AISC, том 81 из CRPIT, стр. 39-46. Australian Computer Society, (2008)OWASP Top 10 - Do Startups Care?, , и . Cyber Security, стр. 1-8. IEEE, (2018)Key recovery for the commercial environment., , , , и . Int. J. Inf. Sec., 1 (3): 161-174 (2002)SKMA: a key management architecture for SCADA systems., , , и . ACSW, том 54 из CRPIT, стр. 183-192. Australian Computer Society, (2006)