From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Asynchronous Unconditionally Secure Computation: An Efficiency Improvement., , и . INDOCRYPT, том 2551 из Lecture Notes in Computer Science, стр. 93-107. Springer, (2002)Optimal Perfectly Secure Message Transmission., , и . CRYPTO, том 3152 из Lecture Notes in Computer Science, стр. 545-561. Springer, (2004)Efficient Asynchronous Secure Multiparty Distributed Computation., и . INDOCRYPT, том 1977 из Lecture Notes in Computer Science, стр. 117-129. Springer, (2000)Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation., и . INDOCRYPT, том 1977 из Lecture Notes in Computer Science, стр. 130-142. Springer, (2000)Asynchronous Secure Communication Tolerating Mixed Adversaries., , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 224-242. Springer, (2002)Perfectly Reliable Message Transmission., , и . Inf. Process. Lett., 100 (1): 23-28 (2006)Distributed consensus in the presence of sectional faults., , , , и . PODC, стр. 202-210. ACM, (2003)Covering hostile terrains with partial and complete visibilities: On minimum distance paths., , , , и . IROS, стр. 2572-2577. IEEE, (2008)On perfectly secure cmmunication over arbitrary networks., , , и . PODC, стр. 193-202. ACM, (2002)Brief announcement: topology knowledge affects probabilistic reliable communication., , , , и . PODC, стр. 314-315. ACM, (2009)