From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CH transform., и . Int. J. Parallel Program., 13 (4): 291-307 (1984)Self-Generated-Certificate Public Key Encryption Without Pairing., и . Public Key Cryptography, том 4450 из Lecture Notes in Computer Science, стр. 476-489. Springer, (2007)New Constructions for Identity-Based Unidirectional Proxy Re-Encryption., , , , и . J. Comput. Sci. Technol., 25 (4): 793-806 (2010)Vector-adaptive vector quantization with application to speech coding., и . IEEE Trans. Commun., 39 (6): 958-962 (1991)A new look at DCT-type transforms., и . IEEE Trans. Acoust. Speech Signal Process., 37 (12): 1899-1908 (1989)Payment technologies for e-commerce.. Springer, (2003)Watermarking protocol of secure verification., , , и . J. Electronic Imaging, 16 (4): 043002 (2007)Fair E-Commerce Protocols without a Third Party., , и . ISCC, стр. 324-327. IEEE Computer Society, (2006)QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN., , , и . AINA, стр. 484-487. IEEE Computer Society, (2005)A Secure Steganography Scheme Based on (N, t) Threshold., и . AINA (2), стр. 536-539. IEEE Computer Society, (2004)