Author of the publication

Access with Pseudonyms.

. Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, page 232-243. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where EAP security claims fail., and . QSHINE, page 46. ACM, (2007)An approach for fast and parallel video processing on Apache Hadoop clusters., and . ICME, page 1-6. IEEE Computer Society, (2014)Optimal contract design for live streaming shopping in a manufacturer-retailer-streamer supply chain., , , and . Electron. Commer. Res., 24 (2): 1071-1093 (June 2024)A Scalable 3.6-to-5.2mW 5-to-10Gb/s 4-tap DFE in 32nm CMOS., , and . ISSCC, page 180-181. IEEE, (2009)Recommendation for Key Derivation Using Pseudorandom Functions. NIST Special Publication, 800-108. The U.S. National Institute of Standards and Technology, (November 2008)Witness hiding proofs and applications.. Aarhus University, Denmark, (1994)New Group Signature Schemes (Extended Abstract)., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 171-181. Springer, (1994)A LSTM Based Bus Arrival Time Prediction Method., , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 544-549. IEEE, (2019)Access with Pseudonyms.. Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, page 232-243. Springer, (1995)An Intelligent Vehicle Oriented EMC Fault Shooting Method Based on Semi-supervised Learning., , , , , and . IC-NIDC, page 1-5. IEEE, (2021)