From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tools for privacy preserving distributed data mining, , , , и . SIGKDD Explor. Newsl., 4 (2): 28--34 (2002)An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications., , , , и . IEEE Trans. Veh. Technol., 59 (7): 3589-3603 (2010)BlackFeather: A framework for background noise forensics., , и . Digit. Investig., 42 (Supplement): 301396 (2022)Dual-Anonymous Off-Line Electronic Cash for Mobile Payment., , , , , и . IEEE Trans. Mob. Comput., 22 (6): 3303-3317 (июня 2023)A simple deniable authentication protocol based on the Diffie-Hellman algorithm., , , , и . Int. J. Comput. Math., 85 (9): 1315-1323 (2008)A Selective Linearization Method For Multiblock Convex Optimization., , и . SIAM J. Optim., 27 (2): 1102-1117 (2017)Series Editorial: Vehicular Networking and 6G Data Taxonomy., и . IEEE Commun. Stand. Mag., 6 (1): 75 (2022)Coordinated Control Strategies for SMES-Battery Hybrid Energy Storage Systems., и . IEEE Access, (2017)REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks., , , и . Comput. Networks, 54 (15): 2744-2755 (2010)Towards collusion-attack-resilient group key management using one-way function tree., , , и . Comput. Networks, (2016)