From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A pragmatic randomized waitlist-controlled effectiveness and cost-effectiveness trial of digital interventions for depression and anxiety., , , , , , , , , и 1 other автор(ы). npj Digit. Medicine, (2020)Author Correction: A pragmatic randomized waitlist-controlled effectiveness and cost-effectiveness trial of digital interventions for depression and anxiety., , , , , , , , , и 1 other автор(ы). npj Digit. Medicine, (2020)Efficiency Tradeoffs for Malicious Two-Party Computation., и . Public Key Cryptography, том 3958 из Lecture Notes in Computer Science, стр. 458-473. Springer, (2006)Distribution chain security., и . ACM Conference on Computer and Communications Security, стр. 63-70. ACM, (2000)Efficient generation of shared RSA keys., и . J. ACM, 48 (4): 702-722 (2001)Improved Efficiency for Private Stable Matching., , и . IACR Cryptology ePrint Archive, (2006)3DPIN: Enhancing security with 3D display., , и . GCCE, стр. 129-130. IEEE, (2014)Mutual Search (Extended Abstract)., , , , , и . SODA, стр. 481-489. ACM/SIAM, (1998)Secure and Efficient Off-Line Digital Money (Extended Abstract)., и . ICALP, том 700 из Lecture Notes in Computer Science, стр. 265-276. Springer, (1993)Anonymous Authentication with Subset Queries (extended abstract)., и . ACM Conference on Computer and Communications Security, стр. 113-119. ACM, (1999)