From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A new key assignment scheme for enforcing complicated access control policies in hierarchy., , и . Future Gener. Comput. Syst., 19 (4): 457-462 (2003)A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem., , и . IEEE Trans. Knowl. Data Eng., 15 (6): 1552-1560 (2003)A dynamic mechanism for determining relationships in a partially ordered user hierarchy., , и . IJHPCN, 3 (5/6): 378-384 (2005)An Efficient Edge Detection Technique for Chinese Calligraphy., , и . JCIS, стр. 960-963. JCIS / Association for Intelligent Machinery, Inc., (2002)A Novel Quadtree-Structured Scheme for Transmitting Chinese Calligraphy Progressively., , и . Eurographics Multimedia Workshop, стр. 95-103. Eurographics Association, (2004)An effective AKA protocol for UMTS., , и . Int. J. Mob. Commun., 10 (4): 427-448 (2012)A new solution for assigning cryptographic keys to control access in mobile agent environments., и . Wirel. Commun. Mob. Comput., (2006)A Cloud-Based Authentication Protocol for RFID Supply Chain Systems., , и . J. Netw. Syst. Manag., 23 (4): 978-997 (2015)Multicast Key Management without Rekeying Processes., , и . Comput. J., 53 (7): 939-950 (2010)A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure., , и . PECCS, стр. 537-540. SciTePress, (2011)