| Publication | Date of Publication | Type |
|---|
| Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security | 2022-07-01 | Paper |
Privacy-preserving ridge regression on distributed data Information Sciences | 2020-09-08 | Paper |
A light-weight bit commitment protocol based on unpredictable channel noise Theoretical Computer Science | 2019-02-14 | Paper |
A secure fault-tolerant conference-key agreement protocol IEEE Transactions on Computers | 2018-08-14 | Paper |
Corrections to "A secure fault-tolerant conference-key agreement protocol" IEEE Transactions on Computers | 2018-07-09 | Paper |
An Optimal Data Hiding Scheme With Tree-Based Parity Check IEEE Transactions on Image Processing | 2017-10-19 | Paper |
Permutation Arrays Under the Chebyshev Distance IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations Information Processing Letters | 2016-06-16 | Paper |
On-line algorithms for the dominating set problem Information Processing Letters | 2016-06-01 | Paper |
Unique signature with short output from CDH assumption Provable Security | 2016-01-27 | Paper |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures Information Security and Privacy | 2009-03-06 | Paper |
Cheating Prevention in Visual Cryptography IEEE Transactions on Image Processing | 2008-12-21 | Paper |
Extracting Randomness from Multiple Independent Sources IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Jensen–Shannon Divergence and Variational Distance IEEE Transactions on Information Theory | 2008-12-21 | Paper |
| Efficient \(k\)-out-of-\(n\) oblivious transfer schemes | 2008-08-07 | Paper |
Identity-Based Proxy Re-encryption Without Random Oracles Lecture Notes in Computer Science | 2008-06-24 | Paper |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption Applied Cryptography and Network Security | 2007-09-24 | Paper |
Optimal resilient threshold GQ signatures Information Sciences | 2007-05-18 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
A public-key traitor tracing scheme with revocation using dynamic shares Designs, Codes and Cryptography | 2005-11-07 | Paper |
| scientific article; zbMATH DE number 2085428 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 1980949 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1980978 (Why is no real title available?) | 2003-09-15 | Paper |
A new approach for visual cryptography Designs, Codes and Cryptography | 2003-04-03 | Paper |
| scientific article; zbMATH DE number 1618051 (Why is no real title available?) | 2002-11-04 | Paper |
Inter-protocol interleaving attacks on some authentication and key distribution protocols Information Processing Letters | 2002-08-04 | Paper |
| scientific article; zbMATH DE number 1618054 (Why is no real title available?) | 2001-07-12 | Paper |
| scientific article; zbMATH DE number 1583810 (Why is no real title available?) | 2001-04-03 | Paper |
Three-quarter approximation for the number of unused colors in graph coloring Information Sciences | 2000-06-07 | Paper |
| scientific article; zbMATH DE number 1440045 (Why is no real title available?) | 2000-05-07 | Paper |
| scientific article; zbMATH DE number 1302187 (Why is no real title available?) | 1999-06-16 | Paper |
On path equivalence of nondeterministic finite automata Information Processing Letters | 1997-02-27 | Paper |
Three \(\sum^ P_ 2\)-complete problems in computational learning theory Computational Complexity | 1993-10-10 | Paper |
Learning probabilistic automata and Markov chains via queries Machine Learning | 1992-09-27 | Paper |
A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata SIAM Journal on Computing | 1992-06-28 | Paper |