From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

k-Times Anonymous Authentication., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 147-165 (2009)A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis., , , и . IEICE Trans. Inf. Syst., 98-D (6): 1161-1165 (2015)An Efficient Group Signature Scheme from Bilinear Maps., и . ACISP, том 3574 из Lecture Notes in Computer Science, стр. 455-467. Springer, (2005)An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization., , и . Towards Trustworthy Elections, том 6000 из Lecture Notes in Computer Science, стр. 141-154. Springer, (2010)An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge., , и . ICALP (2), том 4052 из Lecture Notes in Computer Science, стр. 46-57. Springer, (2006)Universally Composable Undeniable Signature., и . ICALP (2), том 5126 из Lecture Notes in Computer Science, стр. 524-535. Springer, (2008)IC card-based single sign-on system that remains secure under card analysis., , и . Digital Identity Management, стр. 63-72. ACM, (2009)IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response., , , , , , и . CoRR, (2023)DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation., , , , , и . ACM Conference on Computer and Communications Security, стр. 1841-1843. ACM, (2016)Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier., , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 843-862. IEEE Computer Society, (2017)