From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building a Secure Scheme for a Trusted Hardware Sharing Environment., , , , , и . IEEE Access, (2017)AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud., , , , и . Comput. Informatics, 37 (2): 291-310 (2018)(t, k, n) XOR-based visual cryptography scheme with essential shadows., , и . J. Vis. Commun. Image Represent., (2020)XOR-based visual cryptography scheme with essential shadows., , , и . J. Vis. Commun. Image Represent., (2022)Electrocardiogram Based Group Device Pairing for Wearables., , , , , и . IEEE Trans. Mob. Comput., 22 (11): 6394-6409 (ноября 2023)A fair data access control towards rational users in cloud storage., , , , и . Inf. Sci., (2017)Universally composable anonymous Hash certification model., , и . Sci. China Ser. F Inf. Sci., 50 (3): 440-455 (2007)TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , и . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)A method for efficient parallel computation of Tate pairing., , , и . Int. J. Grid Util. Comput., 3 (1): 43-52 (2012)Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model., , , , , и . IET Inf. Secur., 8 (4): 217-223 (2014)