From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient certificateless public key cryptography with authorized equality test in IIoT., , , и . J. Ambient Intell. Humaniz. Comput., 11 (3): 1065-1083 (2020)Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation"., , и . Inf. Process. Lett., (2017)A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment., , , и . Int. J. Netw. Secur., 19 (4): 623-630 (2017)An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet., , , и . Int. J. Netw. Secur., 19 (6): 940-949 (2017)Impulsive Consensus Control for General Second-Order Multi-agent Systems., , , и . ISIE, стр. 1804-1809. IEEE, (2019)Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"., , , и . IEEE Internet Things J., 7 (5): 4676-4681 (2020)Asynchronous impulsive control for consensus of second-order multi-agent networks., , , и . Commun. Nonlinear Sci. Numer. Simul., (2019)An efficient and revocable storage CP-ABE scheme in the cloud computing., , , , и . Computing, 101 (8): 1041-1065 (2019)Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT., , , , , и . DSC, стр. 1-8. IEEE, (2019)Cryptanalysis of an Identity Based Signcryption without Random Oracles., , и . Fundam. Informaticae, 107 (1): 105-109 (2011)