From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An improved dynamic provable data possession model., , и . CCIS, стр. 290-295. IEEE, (2011)Public key cryptosystems secure against memory leakage attacks., , , и . IET Inf. Secur., 10 (6): 403-412 (2016)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections., , , , и . IEEE Trans. Mob. Comput., 23 (4): 3309-3327 (апреля 2024)Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization., , , , , и . J. Comput. Sci. Technol., 35 (5): 1175-1197 (2020)Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform., , , и . IEEE Trans. Very Large Scale Integr. Syst., 30 (9): 1158-1171 (2022)Provably secure three-party password-based authenticated key exchange protocol., и . Inf. Sci., 184 (1): 310-323 (2012)Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks., , , , , , , , и . KSII Trans. Internet Inf. Syst., 12 (7): 3421-3437 (2018)Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher., , и . IACR Cryptology ePrint Archive, (2009)Towards a Multi-Chain Future of Proof-of-Space., , , , , и . CoRR, (2019)Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network., , , , и . ISNN (1), том 5551 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2009)