From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing wireless sensor networks against aggregator compromises., , , и . IEEE Communications Magazine, 46 (4): 134-141 (2008)Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange., , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 133-148. Springer, (2008)Lattice-Based Hierarchical Inner Product Encryption., , и . LATINCRYPT, том 7533 из Lecture Notes in Computer Science, стр. 121-138. Springer, (2012)Tighter Reductions for Forward-Secure Signature Schemes., , и . Public Key Cryptography, том 7778 из Lecture Notes in Computer Science, стр. 292-311. Springer, (2013)The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES., , и . CT-RSA, том 2020 из Lecture Notes in Computer Science, стр. 143-158. Springer, (2001)Contributory Password-Authenticated Group Key Exchange with Join Capability., , , и . CT-RSA, том 6558 из Lecture Notes in Computer Science, стр. 142-160. Springer, (2011)Forward-Secure Threshold Signature Schemes., , и . CT-RSA, том 2020 из Lecture Notes in Computer Science, стр. 441-456. Springer, (2001)Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 335-351. Springer, (2008)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , и . IACR Cryptol. ePrint Arch., (2017)Security Characterization of J-PAKE and its Variants., , , , и . IACR Cryptol. ePrint Arch., (2021)