From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Cheaters in Vector Space Secret Sharing Schemes., , и . Des. Codes Cryptogr., 16 (1): 75-85 (1999)Representing Small Identically Self-Dual Matroids by Self-Dual Codes., и . SIAM J. Discret. Math., 20 (4): 1046-1055 (2006)Ideal Multipartite Secret Sharing Schemes., , и . J. Cryptol., 25 (3): 434-463 (2012)Comments on "Line Digraph Iterations and Connectivity Analysis of de Bruijn and Kautz Graphs"., , и . IEEE Trans. Computers, 45 (6): 768 (1996)Spanners of Underlying Graphs of Iterated Line Digraphs., и . SIROCCO, стр. 180-194. Carleton Scientific, (1996)Taking cube roots in Zm., и . Appl. Math. Lett., 15 (6): 703-708 (2002)Optimal Algebraic Manipulation Detection Codes., , и . IACR Cryptology ePrint Archive, (2014)On secret sharing with nonlinear product reconstruction., , , , и . IACR Cryptology ePrint Archive, (2013)Secret sharing schemes with three or four minimal qualified subsets., и . IACR Cryptology ePrint Archive, (2002)Matroids Can Be Far from Ideal Secret Sharing., , и . TCC, том 4948 из Lecture Notes in Computer Science, стр. 194-212. Springer, (2008)