From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts., , и . IACR Cryptology ePrint Archive, (2019)Algorithms for Weighted Graph Problems on The Modified Cellular Graph Automaton., , и . RAIRO Theor. Informatics Appl., 23 (3): 251-279 (1989)Approximation algorithms for the Traveling Salesman Problem with range condition., и . RAIRO Theor. Informatics Appl., 34 (3): 173-182 (2000)Lattice Based Efficient Threshold Public Key Encryption Scheme., , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (4): 93-107 (2013)A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network., , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (4): 46-60 (2012)An Optimal Algorithm for Reconstructing a Binary Tree., и . Inf. Process. Lett., 42 (2): 113-115 (1992)Privacy Preserving DBSCAN Algorithm for Clustering., и . ADMA, том 4632 из Lecture Notes in Computer Science, стр. 57-68. Springer, (2007)RSA-TBOS signcryption with proxy re-encryption., и . Digital Rights Management Workshop, стр. 59-66. ACM, (2008)Lattice Based Identity Based Proxy Re-Encryption Scheme., , и . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)Guest Editorial: Special Issue on Cyber Security Protections and Applications., , и . J. Internet Serv. Inf. Secur., 4 (2): 1-3 (2014)