From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage., и . NCM, стр. 1577-1580. IEEE Computer Society, (2009)Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192., , , и . FSE, том 3557 из Lecture Notes in Computer Science, стр. 368-383. Springer, (2005)The design of framework for detecting an insider's leak of confidential information., , , и . e-Forensics, стр. 14. ICST/ACM, (2008)Attack on JPEG2000 Steganography Using LRCA., , и . IWDW, том 4283 из Lecture Notes in Computer Science, стр. 268-281. Springer, (2006)Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1., , , и . ACISP, том 3108 из Lecture Notes in Computer Science, стр. 137-148. Springer, (2004)On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis., , , и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 38-52. Springer, (1999)Discovering Methodology and Scenario to Detect Covert Database System., , , и . FGCN (2), стр. 130-135. IEEE Computer Society, (2007)On the Pseudorandomness of a Modification of KASUMI Type Permutations., , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 313-329. Springer, (2004)Off-Line Authentication Using Watermarks., , , и . ICISC, том 2288 из Lecture Notes in Computer Science, стр. 200-213. Springer, (2001)Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding., , , и . ASIACRYPT, том 4284 из Lecture Notes in Computer Science, стр. 283-298. Springer, (2006)