From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ballot Casting Assurance via Voter-Initiated Poll Station Auditing.. EVT, USENIX Association, (2007)Bugs in our pockets: the risks of client-side scanning., , , , , , , , , и 4 other автор(ы). J. Cybersecur., (января 2024)Verifiable Elections and the Public (Dagstuhl Seminar 11281)., , , и . Dagstuhl Reports, 1 (7): 36-52 (2011)Shuffle-sum: coercion-resistant verifiable tallying for STV voting., , , , и . IEEE Trans. Inf. Forensics Secur., 4 (4): 685-698 (2009)Patient controlled encryption: ensuring privacy of electronic medical records., , , и . CCSW, стр. 103-114. ACM, (2009)A Secure Directory Service based on Exclusive Encryption., , , , и . ACSAC, стр. 172-182. IEEE Computer Society, (2002)The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, , , , , , , , , и 1 other автор(ы). A Report by an Ad Hoc Group of Cryptographers and Computer Scientists, (1998)Keys under doormats., , , , , , , , , и 5 other автор(ы). Commun. ACM, 58 (10): 24-26 (2015)The risks of key recovery, key escrow, and trusted third-party encryption., , , , , , , , , и 1 other автор(ы). World Wide Web J., (1997)A Vote of Confidence?, , , и . IEEE Secur. Priv., 15 (3): 12-13 (2017)