From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Proofs of Pairing-Based Cryptography., , и . ACM Conference on Computer and Communications Security, стр. 1156-1168. ACM, (2015)Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds., , , , , и . IET Inf. Secur., 10 (6): 358-371 (2016)Practical Aspects for Exploration and Analysis of Manual Interventions in Process Plants., , , , и . INDIN, стр. 1-6. IEEE, (2021)Knowledge Processing and Contextualisation by Automatical Metadata Extraction and Semantic Analysis., , , , и . EC-TEL, том 5192 из Lecture Notes in Computer Science, стр. 378-383. Springer, (2008)Automatische Extraktion von Metadaten aus verschiedenen Dateiformaten., и . Informatiktage, том S-6 из LNI, стр. 181-184. GI, (2008)Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties., , , и . CSF, стр. 78-94. IEEE Computer Society, (2012)Support for collaborative situation analysis and planning in crisis management teams using interactive tabletops., , , , и . ITS, стр. 273-282. ACM, (2013)LiCoRMS - Towards a Resource Management System Based on Lifecycle and Content Information., , и . CONTEXT, том 6967 из Lecture Notes in Computer Science, стр. 292-295. Springer, (2011)Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model., , и . EUROCRYPT (2), том 9666 из Lecture Notes in Computer Science, стр. 822-851. Springer, (2016)Fitness tracker or digital personal coach: how to personalize training., , , и . UbiComp/ISWC Adjunct, стр. 1063-1067. ACM, (2015)