From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Related-Cipher Attacks.. ICICS, том 2513 из Lecture Notes in Computer Science, стр. 447-455. Springer, (2002)Worst-Case Analysis is Maximum-A-Posteriori Estimation., и . CoRR, (2023)The Misuse of RC4 in Microsoft Word and Excel.. IACR Cryptology ePrint Archive, (2005)An Intelligent Scheduling Access Privacy Protection Model of Electric Vehicle Based on 5G-V2X., , , , , и . Sci. Program., (2021)Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data., , , , , и . IEEE Trans. Dependable Secur. Comput., 18 (4): 1667-1680 (2021)W-ART: Action Relation Transformer for Weakly-Supervised Temporal Action Localization., , , , , и . ICASSP, стр. 2195-2199. IEEE, (2022)Transtl: Spatial-Temporal Localization Transformer for Multi-Label Video Classification., , , , , и . ICASSP, стр. 1965-1969. IEEE, (2022)Resynchronization Attacks on WG and LEX., и . FSE, том 4047 из Lecture Notes in Computer Science, стр. 422-432. Springer, (2006)Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy., и . EUROCRYPT, том 4515 из Lecture Notes in Computer Science, стр. 276-290. Springer, (2007)Cryptanalysis of the Stream Cipher ABC v2., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 56-66. Springer, (2006)