From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Note on "ℰ., и . Math. Log. Q., 33 (2): 115-121 (1987)Computational Power of One-Way Multihead Finite Automata.. STACS, том 415 из Lecture Notes in Computer Science, стр. 176-187. Springer, (1990)Periodic Constant Depth Sorting Networks., , и . STACS, том 775 из Lecture Notes in Computer Science, стр. 201-212. Springer, (1994)Random Fault Attack against Shrinking Generator., , и . ALGOSENSORS, том 5389 из Lecture Notes in Computer Science, стр. 87-99. Springer, (2008)Rapid Mixing and Security of Chaum's Visual Electronic Voting., , и . ESORICS, том 2808 из Lecture Notes in Computer Science, стр. 132-145. Springer, (2003)How to Transmit Messages via WSN in a Hostile Environment., , и . SECRYPT, стр. 387-390. SciTePress, (2011)Lightweight Protocol for Trusted Spontaneous Communication., , , и . INTRUST, том 9473 из Lecture Notes in Computer Science, стр. 228-242. Springer, (2014)Protecting Electronic Signatures in Case of Key Leakage., , , , , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 252-274. Springer, (2016)Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup., и . SCC@AsiaCCS, стр. 43-50. ACM, (2017)Adaptive initialization algorithm for ad hoc radio networks with carrier sensing., , и . Theor. Comput. Sci., 402 (1): 16-28 (2008)