From post

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.

, , , и . ISC, том 3225 из Lecture Notes in Computer Science, стр. 330-341. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

t-Out-of-n String/Bit Oblivious Transfers Revisited., , , , и . ISPEC, том 3439 из Lecture Notes in Computer Science, стр. 410-421. Springer, (2005)DRM system for multiple cascaded business operators., , , и . ICME, стр. 1651-1654. IEEE Computer Society, (2010)Anonymity and Security Support for Persistent Enterprise Conversation., , и . EDOC, стр. 471-476. IEEE Computer Society, (2006)An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids., , и . AINA, стр. 194-197. IEEE Computer Society, (2003)A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents., , и . HICSS, IEEE Computer Society, (2004)Anonymity and Security in Continuous Double Auctions for Internet Retails Market., и . HICSS, IEEE Computer Society, (2004)NetConfEval: Can LLMs Facilitate Network Configuration?, , , , , и . Proc. ACM Netw., 2 (CoNEXT2): 1-25 (2024)Multimodal adaptive identity-recognition algorithm fused with gait perception., , и . Big Data Min. Anal., 4 (4): 223-232 (2021)Publicly Verifiable Auctions with Minimal Leakage., , , и . COMPSAC, стр. 384-389. IEEE Computer Society, (2004)Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group., , , и . ISC, том 3225 из Lecture Notes in Computer Science, стр. 330-341. Springer, (2004)