From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Supporting Cloud Computing: ConfiChair, a Case Study., , и . POST, том 7215 из Lecture Notes in Computer Science, стр. 89-108. Springer, (2012)Formal Verification and Solutions for Estonian E-Voting., , , и . AsiaCCS, ACM, (2024)Trivitas: Voters Directly Verifying Votes., , и . VoteID, том 7187 из Lecture Notes in Computer Science, стр. 190-207. Springer, (2011)Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme., , и . EuroS&P, стр. 606-620. IEEE, (2019)Secure Two-Party Computation in Applied Pi-Calculus: Models and Verification.. TGC, том 9533 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2015)Provably Unlinkable Smart Card-based Payments., , , и . CCS, стр. 1392-1406. ACM, (2023)Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification., и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 361-382. Springer, (2019)Caveat Coercitor: Coercion-Evidence in Electronic Voting., , , и . IEEE Symposium on Security and Privacy, стр. 367-381. IEEE Computer Society, (2013)Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity., , и . POST, том 7215 из Lecture Notes in Computer Science, стр. 169-188. Springer, (2012)Election Verifiability in Receipt-Free Voting Protocols., , , и . CSF, стр. 59-74. IEEE, (2023)