Publication
Practical Byzantine Fault Tolerance
Publication
Improved Online/Offline Signature Schemes
Publication
How to Leak a Secret
Publication
Computer Security in the Real World
Publication
Robust Image Hashing
Publication