From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Achieving high security and efficiency in RFID-tagged supply chains., , , , и . Int. J. Appl. Cryptogr., 2 (1): 3-12 (2010)Database Access Pattern Protection Without Full-Shuffles., , и . IEEE Trans. Inf. Forensics Secur., 6 (1): 189-201 (2011)Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks., , , и . IEEE Trans. Inf. Forensics Secur., 10 (1): 168-177 (2015)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , и . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)Design and Implementation of a Secure Prototype for EPCglobal Network Services., , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels.. IEEE Trans. Commun., 41 (9): 1379-1387 (1993)Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Fortifying password authentication in integrated healthcare delivery systems., , и . AsiaCCS, стр. 255-265. ACM, (2006)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Trellis-coded multidimensional phase modulation., , , , и . IEEE Trans. Inf. Theory, 36 (1): 63-89 (1990)