From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Continuous leakage-resilient access control for wireless sensor networks., , , и . Ad Hoc Networks, (2018)An Internet Anonymous Auction Scheme., и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 171-182. Springer, (2000)Quantum private set intersection cardinality and its application to anonymous authentication., , , , и . Inf. Sci., (2016)Sanitizable Signatures Revisited., , , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 80-97. Springer, (2008)Secure and Efficient Trust Negotiation., , , , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 374-384. Springer, (2006)Novel updatable identity-based hash proof system and its applications., , , и . Theor. Comput. Sci., (2020)A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy., , , и . Inf. Sci., (2020)Trust-oriented QoS-aware composite service selection based on genetic algorithms., , и . Concurr. Comput. Pract. Exp., 26 (2): 500-515 (2014)Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System., , , и . IEEE Access, (2019)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , и . IEEE Trans. Inf. Forensics Secur., 9 (1): 5-13 (2014)