From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

If Piracy Is the Problem, Is DRM the Answer?, , , , и . Digital Rights Management, том 2770 из Lecture Notes in Computer Science, Springer, (2003)Cryptographic Protocols Provably Secure Against Dynamic Adversaries., и . EUROCRYPT, том 658 из Lecture Notes in Computer Science, стр. 307-323. Springer, (1992)A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract), , и . FOCS, стр. 360-371. IEEE Computer Society, (1985)Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases., , , , и . Privacy Enhancing Technologies, том 5672 из Lecture Notes in Computer Science, стр. 185-201. Springer, (2009)Time-stamping., и . Encyclopedia of Cryptography and Security, Springer, (2005)Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model., , и . CRYPTO, том 293 из Lecture Notes in Computer Science, стр. 135-155. Springer, (1987)Agent-Based Simulations of Blockchain protocols illustrated via Kadena's Chainweb., , , и . EuroS&P Workshops, стр. 386-395. IEEE, (2019)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , и . ASPLOS, стр. 263-276. ACM, (2016)Securely combining public-key cryptosystems., и . ACM Conference on Computer and Communications Security, стр. 215-224. ACM, (2001)Secure Names for Bit-Strings., и . ACM Conference on Computer and Communications Security, стр. 28-35. ACM, (1997)