From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Strong Identity-Based Proxy Signature Schemes, Revisited., , , и . Wirel. Commun. Mob. Comput., (2018)Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting., , , , и . IEEE Trans. Inf. Forensics Secur., (2024)Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability., , , , и . ACSAC, стр. 813-828. ACM, (2020)LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems., , , , и . AsiaCCS, стр. 719-731. ACM, (2020)Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience., , , , , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 112-132. Springer, (2018)A Practical Forward-Secure DualRing., , , , и . CANS, том 14342 из Lecture Notes in Computer Science, стр. 516-537. Springer, (2023)Lattice-based remote user authentication from reusable fuzzy signature., , , , и . J. Comput. Secur., 29 (3): 273-298 (2021)Leakage-resilient biometric-based remote user authentication with fuzzy extractors., , , , и . Theor. Comput. Sci., (2020)Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting., , и . Wireless Personal Communications, 94 (3): 1017-1034 (2017)Efficient oblivious transfer with membership verification., , и . IJDSN, (2019)