From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage., , , , и . J. Inf. Secur. Appl., (2020)A generic construction of CCA-secure deterministic encryption., , , , , и . Inf. Process. Lett., (2020)An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things., , , , , , и . IEEE Syst. J., 17 (1): 72-82 (марта 2023)An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing., , , , , , и . IEEE Syst. J., 17 (1): 1012-1023 (марта 2023)Continual Leakage-Resilient Hedged Public-Key Encryption., , , и . Comput. J., 65 (6): 1574-1585 (2022)Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security., и . Comput. J., 60 (8): 1161-1172 (2017)Novel Public-Key Encryption with Continuous Leakage Amplification., , , , и . Comput. J., 64 (8): 1163-1177 (2021)Continuous leakage-resilient certificateless public key encryption with CCA security., и . Knowl. Based Syst., (2017)Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing., и . Inf. Process. Lett., (2018)CCA2 secure public-key encryption scheme tolerating continual leakage attacks., , , и . Secur. Commun. Networks, 9 (17): 4505-4519 (2016)