From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Making Any Identity-Based Encryption Accountable, Efficiently., и . ESORICS (1), том 9326 из Lecture Notes in Computer Science, стр. 326-346. Springer, (2015)Making Public Key Functional Encryption Function Private, Distributively., и . Public Key Cryptography (2), том 10770 из Lecture Notes in Computer Science, стр. 218-244. Springer, (2018)Computational Robust (Fuzzy) Extractors for CRS-Dependent Sources with Minimal Min-entropy., и . TCC (2), том 13043 из Lecture Notes in Computer Science, стр. 689-717. Springer, (2021)Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications., , и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 548-567. Springer, (2015)On the Power of Public-key Function-Private Functional Encryption., , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 585-593. (2016)Bit-rate estimation for bit-rate reduction H.264/AVC video transcoding in wireless networks., , , и . ISWPC, стр. 464-467. IEEE, (2008)Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability., и . ISC, том 4779 из Lecture Notes in Computer Science, стр. 158-174. Springer, (2007)Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds)., , и . ASIACRYPT (2), том 13091 из Lecture Notes in Computer Science, стр. 514-543. Springer, (2021)CCA Updatable Encryption Against Malicious Re-encryption Attacks., , и . ASIACRYPT (3), том 12493 из Lecture Notes in Computer Science, стр. 590-620. Springer, (2020)Dragoon: Private Decentralized HITs Made Practical., , и . ICDCS, стр. 910-920. IEEE, (2020)