From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts., , и . IACR Cryptology ePrint Archive, (2019)A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network., , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (4): 46-60 (2012)Lattice Based Efficient Threshold Public Key Encryption Scheme., , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (4): 93-107 (2013)Algorithms for Weighted Graph Problems on The Modified Cellular Graph Automaton., , и . RAIRO Theor. Informatics Appl., 23 (3): 251-279 (1989)Approximation algorithms for the Traveling Salesman Problem with range condition., и . RAIRO Theor. Informatics Appl., 34 (3): 173-182 (2000)An Optimal Algorithm for Reconstructing a Binary Tree., и . Inf. Process. Lett., 42 (2): 113-115 (1992)Privacy Preserving DBSCAN Algorithm for Clustering., и . ADMA, том 4632 из Lecture Notes in Computer Science, стр. 57-68. Springer, (2007)Perfectly Reliable Message Transmission., , и . Inf. Process. Lett., 100 (1): 23-28 (2006)Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 38-58. Springer, (2013)Communication and Round Efficient Information Checking Protocol, и . CoRR, (2010)