From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity-based Conference Key Distribution Systems., и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 175-184. Springer, (1987)A knowledge transfer model: From zero-knowledge to full-knowledge., и . ALT, стр. 187-195. Ohmsha, (1991)New Public-Key Schemes Based on Elliptic Curves over the Ring Zn., , , и . CRYPTO, том 576 из Lecture Notes in Computer Science, стр. 252-266. Springer, (1991)Predictive rate control for realtime video streaming with network triggered handover., , , и . WCNC, стр. 1335-1340. IEEE, (2005)An interactive knowledge transfer model and analysis of "Mastermind" game., и . ALT, стр. 196-206. Ohmsha, (1991)An operating system kernel mechanism for the poly-processor system PPS-R., , , и . AFIPS National Computer Conference, том 49 из AFIPS Conference Proceedings, стр. 147-156. AFIPS Press, (1980)Secure Conference Key Distribution Schemes for Conspiracy Attack.. EUROCRYPT, том 658 из Lecture Notes in Computer Science, стр. 449-453. Springer, (1992)Demonstrating Possession without Revealing Factors and its Application., , и . AUSCRYPT, том 453 из Lecture Notes in Computer Science, стр. 273-293. Springer, (1990)Nonlinear Parity Circuits and their Cryptographic Applications., и . CRYPTO, том 537 из Lecture Notes in Computer Science, стр. 582-600. Springer, (1990)Direct Demonstration of the Power to Break Public-Key Cryptosystems.. AUSCRYPT, том 453 из Lecture Notes in Computer Science, стр. 14-21. Springer, (1990)