From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic Group Key Exchange Revisited., и . CANS, том 6467 из Lecture Notes in Computer Science, стр. 261-277. Springer, (2010)Group-Based Source-Destination Verifiable Encryption with Blacklist Checking., , и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 186-203. Springer, (2017)Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications., , и . Wireless Personal Communications, 97 (2): 3017-3030 (2017)k-time Proxy Signature: Formal Definition and Efficient Construction., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 154-164. Springer, (2013)Hierarchical Functional Encryption for Linear Transformations., , , и . ACISP (1), том 10342 из Lecture Notes in Computer Science, стр. 23-43. Springer, (2017)Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups., , , , , и . IEEE Access, (2019)An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices., , и . Theor. Comput. Sci., 378 (2): 198-207 (2007)Strongly leakage resilient authenticated key exchange, revisited., , , , , и . Des. Codes Cryptogr., 87 (12): 2885-2911 (2019)A note on the strong authenticated key exchange with auxiliary inputs., , , , , и . Des. Codes Cryptogr., 85 (1): 175-178 (2017)Two-factor mutual authentication based on smart cards and passwords., , , и . J. Comput. Syst. Sci., 74 (7): 1160-1172 (2008)