From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients., , , , , , и . CoRR, (2022)Secure Software-Defined Networking Based on Blockchain., , , и . CoRR, (2019)A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network., , , , и . CoRR, (2022)BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain., , , , и . IACR Cryptol. ePrint Arch., (2020)Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage., , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (3): 1518-1531 (2022)Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security., , , , , и . AsiaCCS, стр. 247-255. ACM, (2016)PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace., , , , , , и . IEEE Internet Things J., 11 (8): 13424-13436 (апреля 2024)Enabling Efficient and Malicious Secure Data Aggregation in Smart Grid With False Data Detection., , , , , и . IEEE Trans. Smart Grid, 15 (2): 2203-2213 (2024)ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero., , , , , , и . J. Parallel Distributed Comput., (2022)Mobile Authentication System Based on National Regulation and NFC Technology., , и . DSC, стр. 590-595. IEEE Computer Society, (2016)