From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptography: Past, Present and Future.. OTM Conferences (2), том 4804 из Lecture Notes in Computer Science, стр. 1529-1530. Springer, (2007)Analysis of a Public Key Approach Based on Polynomial Substitution., и . CRYPTO, том 218 из Lecture Notes in Computer Science, стр. 340-349. Springer, (1985)The Adolescence of Public-Key Cryptography (Abstract).. EUROCRYPT, том 434 из Lecture Notes in Computer Science, стр. 2. Springer, (1989)What Did We Do Before Biometric Passports? A Review of Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner.. Cryptologia, 32 (4): 368-369 (2008)Crypto Policy Perspectives., , , , , , , , , и . Commun. ACM, 37 (8): 115-121 (1994)The Evolving Meaning of Information Security.. KDD, стр. 5. ACM, (2016)Privacy and Authentication: An Introduction to Cryptography., и . Democratizing Cryptography, том 42 из ACM Books, ACM, (2022)Privacy on the Line -- The Politics of Wiretapping and Encryption, и . The MIT Press, Cambridge, Massachusetts, (1998)Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue., и . Des. Codes Cryptogr., 7 (1-2): 7-9 (1996)Privacy on the line - the politics of wiretapping and encryption (updated expanded ed.)., и . MIT Press, (2007)