From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Friendly Observers Ease Off-Line E-Cash., , и . CARDIS, том 180 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (2000)The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution., , и . IAW, стр. 288-291. IEEE, (2003)From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?. ACM Conference on Computer and Communications Security, стр. 1-2. ACM, (2015)Breaking and Repairing Asymmetric Public-Key Traitor Tracing., и . Digital Rights Management Workshop, том 2696 из Lecture Notes in Computer Science, стр. 32-50. Springer, (2002)Adaptively secure non-interactive threshold cryptosystems., и . Theor. Comput. Sci., (2013)Efficient traceable signatures in the standard model., и . Theor. Comput. Sci., 412 (12-14): 1220-1242 (2011)Linearly homomorphic structure-preserving signatures and their applications., , , и . Des. Codes Cryptogr., 77 (2-3): 441-477 (2015)Cryptographic Hardness based on the Decoding of Reed-Solomon Codes with Applications, и . Electron. Colloquium Comput. Complex., (2002)Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model, и . Electron. Colloquium Comput. Complex., (2005)Revokable and Versatile Electronic Money (extended abstract)., и . ACM Conference on Computer and Communications Security, стр. 76-87. ACM, (1996)