From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS., , и . IEEE Communications Letters, 14 (4): 366-368 (2010)Security Arguments for a Class of ID-based Signatures., , и . IACR Cryptology ePrint Archive, (2007)An Improved Algorithm for uP + vQ Using JSF13., , и . ACNS, том 3089 из Lecture Notes in Computer Science, стр. 467-478. Springer, (2004)Designing Truthful Spectrum Auctions for Multi-hop Secondary Networks., , и . IEEE Trans. Mob. Comput., 14 (2): 316-327 (2015)基于协同地址碰撞的隐蔽认证方法 (Cooperative Address Knocking Based Covert Authentication)., , и . 计算机科学, 43 (9): 175-179 (2016)Proof of Forward Security for Password-based Authenticated Key Exchange., и . Int. J. Netw. Secur., 7 (3): 335-341 (2008)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)An Efficient Key-Evolving Signature Scheme Based on Pairing., и . FTDCS, стр. 68-73. IEEE Computer Society, (2004)High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes., , , , и . WISE (2), том 8787 из Lecture Notes in Computer Science, стр. 336-350. Springer, (2014)Collecting Internet Malware Based on Client-side Honeypot., , , , и . ICYCS, стр. 1493-1498. IEEE Computer Society, (2008)