From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Data security against receiver corruptions: SOA security for receivers from simulatable DEMs., , , , и . Inf. Sci., (2019)A Secure Cloud Backup System with Deduplication and Assured Deletion., , , , и . ProvSec, том 10592 из Lecture Notes in Computer Science, стр. 74-83. Springer, (2017)Asymmetric Group Message Franking: Definitions & Constructions., , , , , и . IACR Cryptol. ePrint Arch., (2023)LaT-Voting: Traceable Anonymous E-Voting on Blockchain., и . NSS, том 11928 из Lecture Notes in Computer Science, стр. 234-254. Springer, (2019)DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF., , , , и . ASIACRYPT (2), том 13792 из Lecture Notes in Computer Science, стр. 340-370. Springer, (2022)Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead., , , , , и . ASIACRYPT (1), том 14438 из Lecture Notes in Computer Science, стр. 272-301. Springer, (2023)Simulation-Based Bi-Selective Opening Security for Public Key Encryption., , , и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 456-482. Springer, (2021)Unforgeable Watermarking Schemes with Public Extraction., , , , и . SCN, том 11035 из Lecture Notes in Computer Science, стр. 63-80. Springer, (2018)Fully Secure Cipertext-Policy Hiding CP-ABE., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 24-39. Springer, (2011)