Yvo G. Desmedt
#128,947
Most Influential Person Now
Yvo G. Desmedt's AcademicInfluence.com Rankings
Yvo G. Desmedtmathematics Degrees
Mathematics
#6189
World Rank
#8620
Historical Rank
Measure Theory
#1187
World Rank
#1513
Historical Rank

Download Badge
Computer Science Mathematics
Yvo G. Desmedt's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Yvo G. Desmedt Influential?
(Suggest an Edit or Addition)Yvo G. Desmedt's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Threshold Cryptosystems (1989) (1181)
- A Secure and Efficient Conference Key Distribution System (Extended Abstract) (1994) (547)
- Advances in Cryptology — CRYPTO ’94 (2001) (534)
- Shared Generation of Authenticators and Signatures (Extended Abstract) (1991) (461)
- Society and Group Oriented Cryptography: A New Concept (1987) (454)
- Public Key Cryptography — PKC 2003 (2002) (418)
- A New Paradigm of Hybrid Encryption Scheme (2004) (345)
- How to share a function securely (1994) (335)
- Threshold cryptography (1994) (295)
- Special Uses and Abuses of the Fiat-Shamir Passport Protocol (1987) (247)
- Man-in-the-Middle Attack (2005) (182)
- Optimum Traitor Tracing and Asymmetric Schemes (1998) (179)
- Some Recent Research Aspects of Threshold Cryptography (1997) (167)
- Redistributing Secret Shares to New Access Structures and Its Applications (1997) (165)
- Perfectly Secure Message Transmission Revisited (2002) (150)
- How to Break a Practical MIX and Design a New One (2000) (149)
- Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback (1992) (144)
- A secure and scalable Group Key Exchange system (2005) (133)
- Identification Tokens - or: Solving the Chess Grandmaster Problem (1990) (112)
- Efficient and Secure Conference-Key Distribution (1996) (109)
- Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group (1994) (103)
- Related-Key Differential Cryptanalysis of 192-bit Key AES Variants (2003) (103)
- Broadcast anti-jamming systems (1999) (100)
- Equilibria of plurality voting with abstentions (2010) (91)
- Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?) (1986) (90)
- A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes (1986) (88)
- Secure implementation of identification systems (2004) (78)
- Weaknesses of undeniable signature schemes (1991) (69)
- Parallel reliable threshold multisignature (1992) (59)
- A Structured ElGamal-Type Multisignature Scheme (2000) (59)
- Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example (2010) (59)
- Abuses in Cryptography and How to Fight Them (1988) (58)
- Efficient Multiplicative Sharing Schemes (1996) (58)
- Perfectly Secure Message Transmission (2011) (48)
- Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography (1994) (47)
- Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract) (1995) (45)
- Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question (2001) (41)
- A critical analysis of the security of knapsack public-key algorithms (1984) (40)
- Analytical Characteristics of the DES (1983) (39)
- Audio and Optical Cryptography (1998) (39)
- Defending systems against viruses through cryptographic authentication (1989) (38)
- Complementation-Like and Cyclic Properties of AES Round Functions (2004) (37)
- How to Attack Two-Factor Authentication Internet Banking (2013) (37)
- Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract) (1990) (35)
- Is hierarchical public-key certification the next target for hackers? (2004) (35)
- Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) (1998) (35)
- Covert Channels (2005) (34)
- Computer security by redefining what a computer is (1993) (34)
- A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback (2005) (33)
- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups (2007) (32)
- Efficient Hardware and Software Implementations for the DES (1985) (30)
- Towards practical “proven secure” authenticated key distribution (1993) (29)
- Poster: preliminary analysis of Google+'s privacy (2011) (29)
- Some Bounds and a Construction for Secure Broadcast Encryption (1998) (29)
- SUBLIMINAL-FREE AUTHENTICATION AND SIGNATURE (1988) (28)
- Encryption Schemes (1999) (28)
- Dependence of Output on Input in DES: Small Avalanche Characteristics (1985) (28)
- ARBITRATED UNCONDITIONALLY SECURE AUTHENTICATION CAN BE UNCONDITIONALLY PROTECTED AGAINST ARBITER ATTACKS (1991) (28)
- Efficient Hardware Implementation of the DES (1985) (27)
- A Progress Report on Subliminal-Free Channels (1996) (27)
- Your Facebook deactivated friend or a cloaked spy (2012) (26)
- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders (2006) (26)
- Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences (1985) (26)
- Simmons' protocol is not free of subliminal channels (1996) (25)
- Moiré cryptography (2000) (25)
- A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack (2009) (25)
- Chinese lotto as an exhaustive code-breaking machine (1991) (25)
- Subliminal-Free Authentication and Signature (Extended Abstract) (1988) (25)
- Secure Communication in an Unknown Network Using Certificates (1999) (25)
- ECRYPT Stream Cipher Project (2011) (24)
- What Happened with Knapsack Cryptographic Schemes (1988) (24)
- Classification of Ideal Homomorphic Threshold Schemes over Finite Abelian Groups (Extended Abstract) (1992) (22)
- Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection (2002) (22)
- Edge-colored graphs with applications to homogeneous faults (2011) (22)
- Accountable Privacy (2004) (22)
- The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys) (1986) (21)
- Walsh transforms and cryptographic applications in bias computing (2016) (21)
- Weakness of Undeniable Signature Schemes (Extended Abstract) (1991) (21)
- Secure Protocols with Asymmetric Trust (2007) (20)
- Treshold Cryptosystems (invited talk) (1992) (19)
- Unconditionally Secure Approximate Message Authentication (2009) (19)
- Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract) (1992) (19)
- Efficient Zero-Knowledge Identification Schemes for Smart Cards (1992) (19)
- Computing Functions of a Shared Secret (2000) (18)
- Efficient secret sharing schemes achieving optimal information rate (2014) (17)
- Diffie-Hellman Key Exchange (2011) (17)
- Trust and security: A new look at the Byzantine generals problem (1996) (17)
- Revisiting Pairing Based Group Key Exchange (2008) (16)
- Secure Implementations of Identification Systems (1991) (15)
- Using Approximation Hardness to Achieve Dependable Computation (1998) (15)
- Electronic Voting: Starting Over? (2005) (15)
- Advances in cryptology--CRYPTO '94 : 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994 : proceedings (1994) (14)
- Enabling secure on-line DNS dynamic update (2000) (14)
- The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel) (1992) (14)
- A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group (1998) (13)
- Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages (1999) (13)
- On Secure Multi-party Computation in Black-Box Groups (2007) (13)
- Which PKI (public key infrastructure) is the right one? (panel session) (2000) (13)
- Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context (1989) (12)
- Graph Coloring Applied to Secure Computation in Non-Abelian Groups (2012) (12)
- Bounds and constructions for key distribution schemes (2009) (12)
- A General Zero-Knowledge Scheme (1997) (12)
- Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question (1999) (12)
- Secure linking of customers, merchants and banks in electronic commerce (2000) (12)
- Entity Resolution (2011) (12)
- Remarks on soundness of proofs (zero-knowledge schemes) (1989) (12)
- Maximum Flows and Critical Vertices in AND/OR Graphs (2002) (11)
- All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions (extended abstract) (1991) (11)
- Cerebral Cryptography (1998) (10)
- Is There an ultimate Use of Cryptography? (1986) (10)
- Radio Networks with Reliable Communication (2005) (10)
- Security or Privacy , Must We Choose ? (2001) (10)
- A CCA Secure Hybrid Damgård's ElGamal Encryption (2008) (10)
- Identity-based Key Infrastructures (IKI) (2004) (10)
- Passports and visas versus IDs (1992) (10)
- Cryptanalysis of Secure Message Transmission Protocols with Feedback (2009) (9)
- ElGamal Public Key Encryption (2005) (9)
- General Perfectly Secure Message Transmission Using Linear Codes (2010) (9)
- Controlled Homomorphic Encryption: Definition and Construction (2017) (9)
- Some results in linear secret sharing (2000) (9)
- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes (2010) (9)
- Propagation Characteristics of the DES (1985) (9)
- Parity Check based redistribution of secret shares (2015) (9)
- Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System (2012) (9)
- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme (1985) (9)
- Perfect Zero-Knowledge Sharing Schemes over any Finite Abelian Group (1993) (8)
- Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher (2010) (8)
- Several Exhaustive Key Search Machines and DES (1986) (8)
- Broadcast Interactive Proofs (Extended Abstract) (1991) (8)
- A General Zero-Knowledge Scheme (Extended Abstract) (1990) (8)
- Unconditionally private and reliable communication in an untrusted network (2005) (8)
- Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs (2004) (8)
- What is the Future of Cryptography? (2015) (8)
- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure (2007) (7)
- Passports and Visas Versus IDS (Extended Abstract) (1988) (7)
- Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption (2019) (7)
- Index Calculation Attacks on RSA Signature and Encryption (2006) (7)
- Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract) (2012) (6)
- A high availability internetwork capable of accommodating compromised routers (2006) (6)
- Two new economic models for privacy (2013) (6)
- Usable Privacy by Visual and Interactive Control of Information Flow (2012) (6)
- Active Security in Multiparty Computation over Black-Box Groups (2012) (6)
- A general public key cryptographic Knapsack algorithm based on linear algebra (1983) (6)
- The mathematical relation between the economic, cryptographic and information theoretical aspects of authentication (1983) (5)
- Practical Proven Secure Authentication with Arbitration (1992) (5)
- Models For Dependable Computation with Multiple Inputs and Some Hardness Results (2000) (5)
- Klein Bottle Routing: An Alternative to Onion Routing and Mix Network (2006) (5)
- Access Structure (2005) (5)
- Establishing Big Broth Using Covert Channals and Other Covert Techniques (1996) (5)
- Relay Attack (2005) (5)
- A Key Distribution System Based On Any One-Way Function (Extended Abstract) (1989) (5)
- The Importance of Good Key Scheduling Schemes (how To Make a Secure Des Scheme With Less-than-or-equal-to-48 Bit Keys) (1986) (5)
- Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor (2016) (5)
- Improved Distinguishing Attack on Rabbit (2010) (4)
- Efficient Zero-Knowledge Proofs for Some Practical Graph Problems (2002) (4)
- Linear algebra and extended mappings generalise public key cryptographic Knapsack algorithms (1983) (4)
- Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography (2016) (4)
- Unconditionally secure ring authentication (2007) (4)
- Protecting against Abuses of Cryptosystems in Particular in the Context of Verification of Peace Treaties (Extended Abstract) (1990) (4)
- A proven secure tracing algorithm for the optimal KD traitor tracing scheme (2000) (4)
- Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments (2010) (3)
- An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers (1991) (3)
- Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing (2019) (3)
- Framing in Secret Sharing (2021) (3)
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption (2008) (3)
- Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols (2015) (3)
- A highly secure cryptographic algorithm for high speed transmission (1982) (3)
- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security (2005) (3)
- Realistic versus Rational Secret Sharing (2019) (3)
- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels (2007) (3)
- Revisiting Colored Networks and Privacy Preserving Censorship (2006) (3)
- Knapsack cryptographic schemes (2005) (3)
- Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families (2020) (3)
- Human Perfectly Secure Message Transmission Protocols and Their Applications (2012) (3)
- Is there a Need for Survivable Computation in Critical Infrastructures? (2002) (3)
- Station-to-Station Protocol (2005) (3)
- Cellular Network Security (2011) (3)
- Preliminary Analysis of Google+'s Privacy (2011) (3)
- Verifiable Democracy a Protocol to Secure an Electronic Legislature (2002) (3)
- Additional Properties in the S-Boxes of the DES (1986) (3)
- TCP SYN Flooding (2004) (3)
- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes (2003) (3)
- Conceptual Modeling (2012) (3)
- Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification (2020) (3)
- Verifiable Democracy (1999) (3)
- Token (2021) (3)
- Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings (2005) (3)
- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng (2006) (3)
- Secure Communication in Multicast Graphs (2011) (3)
- Remote Attestation (2011) (3)
- Improved Davies-Murphy's Attack on DES Revisited (2013) (3)
- Economically Optimal Variable Tag Length Message Authentication (2017) (2)
- Preliminary Analysis of Google+'s Privacy (Poster) (2011) (2)
- Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography (2003) (2)
- Decentralized Trust Management (2011) (2)
- Tables of Contents (1985) (2)
- Perfectly Secure Message Transmission Revisited (Extended Abstract) (2002) (2)
- Practical and Proven Zero-Knowledge Constant Round Variants of GQ and Schnorr (1999) (2)
- Nonbinary Audio Cryptography (1999) (2)
- Towards Usable and Secure Internet Voting (2013) (2)
- Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing (2016) (2)
- How iterative transformations can help to crack the Merkle-Hellman cryptographic scheme (1982) (2)
- On the Importance of Memory Resources in the Security of Key Exchange Protocols (1990) (2)
- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring (2007) (2)
- Cryptography Based Data Security (1990) (2)
- A critical analysis of models for fault-tolerant and secure computation (2003) (2)
- Redistribution of Mechanical Secret Shares (2002) (2)
- FAST AUTHENTICATION USING PUBLIC KEY SCHEMES. (1984) (2)
- Information-theoretic secure identification (1998) (2)
- Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report) (2008) (2)
- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations (2018) (2)
- Secure communication in an unknown network with Byzantine faults (1998) (2)
- Equitability in Retroactive Data Confiscation versus Proactive Key Escrow (2001) (2)
- Breaking the Traditional Computer Security Barriers (1992) (2)
- Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology (1994) (2)
- Security in information systems : Advances and new challenges (2014) (1)
- Information security: 16th International conference, ISC 2013 Dallas, Texas, november 13–15, 2013 proceedings (2015) (1)
- Robust Operations (2006) (1)
- Accountable Privacy. Authors' reply (2006) (1)
- Identifying which infrastructures are critical (2005) (1)
- Vulverability of Complex Systems and Critical Vertices in AND / OR Graphs (2002) (1)
- Homogeneous Faults, Colored Edge Graphs, and Cover Free Families (2011) (1)
- On Resistance of DES to Related-Key Differential Cryptanalysis (2005) (1)
- Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme (2011) (1)
- The most general cryptographic Knapsack scheme (1984) (1)
- Approximation Hardness and Secure Communication in Broadcast Channels (1999) (1)
- A Brief Survey of Research Jointly with Jean-Jacques Quisquater (2012) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Software-Based Attestation (2011) (1)
- Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering: Preface (2012) (1)
- A Tribute to David Kahn (2009) (1)
- The influence of parallel coders in the encoding of a discrete source (1982) (1)
- Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme (2005) (1)
- Securing an Electronic Legislature Using Threshold Signatures (2007) (1)
- "Need to know" to defend one's home, or should one buy a wifi enabled thermostat? (2017) (1)
- Tables of Contents (2009) (0)
- The bank card (2013) (0)
- Securing Abstention in an Electronic Legislature (2005) (0)
- BIOS Basic Input Output System (2011) (0)
- Understanding Why Some Network Protocols Are User-Unfriendly (2005) (0)
- Subgroup Cryptosystems (2011) (0)
- Cryptographic Protocol (2011) (0)
- Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures (2017) (0)
- Broader privacy issues (2003) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Revisiting the Karnin, Greene and Hellman Bounds (2008) (0)
- A high speed parallel discrete source coder (1981) (0)
- Deniable encryption (2005) (0)
- Algebraic Structures and Cycling Test of Rijndael (2001) (0)
- Critical Analysis of the Use of Redundancy to Achieve Survivability in the Presence of Malicious Attacks (2002) (0)
- Perfect Anonymity (2019) (0)
- Trojan Horses, Computer Viruses, and Worms (2011) (0)
- Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol (2011) (0)
- On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (2014) (0)
- Cryptography: How to Attack, What to Protect? (1984) (0)
- On The Distinguishability of Ideal Ciphers (2019) (0)
- Biometric Cryptosystem (2009) (0)
- Information Hiding (2009) (0)
- VSS Made Simpler (2019) (0)
- Broadcast Authentication from an Information Theoretic Perspective (2011) (0)
- IEE Proceedings: Information Security : Editorial (2006) (0)
- IS THERE AN ULTIMATE USE OF CRYPTOGRAPHY (EXTENDED ABSTRACT) (1987) (0)
- A Tree-based Model of Unicast Stream Authentication (2006) (0)
- Trojan Horses, Computer Viruses and Worms (2005) (0)
- Access Lists (2020) (0)
- A KEY DISTRIBUTION-SYSTEM BASED ON ANY 1-WAY FUNCTION (1990) (0)
- Covert Cryptography Covert Cryptography Yvo G. Desmedt Date Graduate School Approval Date Covert Cryptography (2007) (0)
- Fighting entity authentication frauds by combining different technologies (2005) (0)
- On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion) (2014) (0)
- Breaking the Traditional Computer Security Research Barriers (2013) (0)
- Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin (2017) (0)
- Approach and Will Most Likely Be Used in Our Nal Version (2007) (0)
- Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper) (2022) (0)
- The "a" Cipher Does not necessarily Strengthen Security (1991) (0)
- Implementing a multi-hat PDA (Transcript of discussion) (2007) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Does public key cryptographic provide a practical and secure protection of data storage and transmission (1983) (0)
- Computational Complexity of Reliability / Security in Colored Networks and Privacy Preserving Censorship (2006) (0)
- Cryptographic Foundations (1999) (0)
- A subexponential construction of graph coloring for multiparty computation (2014) (0)
- Strengthening Software Diversity Through Targeted Diversification (2016) (0)
- Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures (2018) (0)
- Proceedings of the 16th International Conference on Information Security - Volume 7807 (2013) (0)
- Secure Implementation of Identification Systems 1 (1991) (0)
- Protected against Arbiter ' s Attacks ( Extended Abstract ) (2001) (0)
- A Comment on the Eeciency of Secret Sharing Scheme over Any Nite Abelian Group ? (1998) (0)
- Firewall Policy Analysis (2011) (0)
- Does public key cryptography provide adequate communication security (1983) (0)
- File System Permissions (2011) (0)
- Analyzing Survivable Computation in Critical Infrastructures (2005) (0)
- Runtime Analysis (2011) (0)
- Can public key cryptographic provide fast, practical and secure against eavesdropping and fraud in modern communication networks? (1983) (0)
- Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token (1992) (0)
- Credential Verification (2011) (0)
- Information Theoretic Security - Second International Conference, ICITS 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers (2009) (0)
- Walsh transforms and cryptographic applications in bias computing (2015) (0)
- Cryptology and Network Security, 4th International Conference, CANS 2005 Proceedings (2005) (0)
- Stream and Multicast Authentication (2011) (0)
- Speaker Biometrics (2009) (0)
- Is the protection of data security and privacy an unattainable dream (1984) (0)
- Public Key Cryptography -- PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003 : proceedings (2002) (0)
- Information Security (2015) (0)
- Pseudo-Cryptanalysis of Luffa (2010) (0)
- Private Key Cryptosystem (2006) (0)
- Designated 2-Verifier Proofs and their Application to Electronic Commerce (2001) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Yvo G. Desmedt?
Yvo G. Desmedt is affiliated with the following schools: