From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

APES - Anonymity and Privacy in Electronic Services., , и . Datenschutz und Datensicherheit, (2003)Problems, solutions and experience of the first international student's Olympiad in cryptography., , , , , , , , и . IACR Cryptology ePrint Archive, (2015)Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function., и . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, том 23 из NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)Technologies for controlled anonymity, , , , , , , , , и 1 other автор(ы). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)Identification via location-profiling in GSM networks., , , и . WPES, стр. 23-32. ACM, (2008)A fast dual-field modular arithmetic logic unit and its hardware implementation., , и . ISCAS, IEEE, (2006)Location privacy in wireless personal area networks., и . Workshop on Wireless Security, стр. 11-18. ACM, (2006)Equivalent Keys in HFE, C*, and Variations., и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 33-49. Springer, (2005)Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks., , , и . EuroS&P Workshops, стр. 122-131. IEEE, (2017)Provoking security: Spoofing attacks against crypto-biometric systems., и . WorldCIS, стр. 67-72. IEEE, (2015)