From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evolution of physics-based methodology for exploring the conformational energy landscape of proteins., , , , , , , и . J. Comput. Chem., 23 (1): 28-34 (2002)The Security of Abreast-DM in the Ideal Cipher Model., и . IACR Cryptology ePrint Archive, (2009)UNRES: a united-residue force field for energy-based prediction of protein structure - orgin and significance of multibody terms., , , , , , , , , и 1 other автор(ы). RECOMB, стр. 193-200. ACM, (2000)A Comparative Analysis of Distributed Ledger Technologies for Smart Contract Development., , , , , , и . PIMRC, стр. 1-6. IEEE, (2019)New Constructions of MACs from (Tweakable) Block Ciphers., , и . IACR Trans. Symmetric Cryptol., 2017 (2): 27-58 (2017)Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes., , , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 319-341. Springer, (2015)Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation., и . IEEE Trans. Inf. Theory, 58 (9): 6165-6182 (2012)Deterministic Key Predistribution Schemes for Distributed Sensor Networks., и . Selected Areas in Cryptography, том 3357 из Lecture Notes in Computer Science, стр. 294-307. Springer, (2004)Tree-Based Key Distribution Patterns., и . Selected Areas in Cryptography, том 3897 из Lecture Notes in Computer Science, стр. 189-204. Springer, (2005)Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005., , , и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 262-270. Springer, (2006)