From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Compliant cryptologic protocols., , и . Int. J. Inf. Sec., 1 (3): 189-202 (2002)On the Connection between Signcryption and One-pass Key Establishment., , и . IACR Cryptology ePrint Archive, (2009)SKMA: a key management architecture for SCADA systems., , , и . ACSW, том 54 из CRPIT, стр. 183-192. Australian Computer Society, (2006)Provably Secure Key Exchange: An Engineering Approach., , и . ACSW, том 21 из CRPIT, стр. 97-104. Australian Computer Society, (2003)Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing., , и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 84-98. Springer, (2005)Valuable Puzzles for Proofs-of-Work., и . DPM/CBT@ESORICS, том 11025 из Lecture Notes in Computer Science, стр. 130-139. Springer, (2018)A New Multiple Key Cipher and an Improved Voting Scheme.. EUROCRYPT, том 434 из Lecture Notes in Computer Science, стр. 617-625. Springer, (1989)Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions., , и . IEEE Commun. Mag., 58 (7): 72-77 (2020)A Three Phased Schema for Sealed Bid Auction System Design., , и . ACISP, том 1841 из Lecture Notes in Computer Science, стр. 412-426. Springer, (2000)Secure Selection Protocols., , и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 132-146. Springer, (1999)