From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , и . Cryptology and Network Security, том 4856 из Lecture Notes in Computer Science, стр. 265-281. Springer, (2007)Friendly Observers Ease Off-Line E-Cash., , и . CARDIS, том 180 из IFIP Conference Proceedings, стр. 3-18. Kluwer, (2000)The TrustedFlow (TM) Protocol-Idiosyncratic Signatures for Authenticated Execution., , и . IAW, стр. 288-291. IEEE, (2003)On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications., , , , , , , , и . IACR Cryptology ePrint Archive, (2019)General Group Authentication Codes and Their Relation to Ünconditionally-Secure Signatures"., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 231-247. Springer, (2004)Adaptive Security for the Additive-Sharing Based Proactive RSA., , и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 240-263. Springer, (2001)Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies., , и . Public Key Cryptography, том 7778 из Lecture Notes in Computer Science, стр. 423-442. Springer, (2013)Self-tallying Elections and Perfect Ballot Secrecy., и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 141-158. Springer, (2002)Characterization of Security Notions for Probabilistic Private-Key Encryption., и . J. Cryptol., 19 (1): 67-95 (2006)Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation., и . J. Cryptol., 9 (3): 149-166 (1996)