From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-interactive Deniable Authentication Protocols., , и . Inscrypt, том 7537 из Lecture Notes in Computer Science, стр. 142-159. Springer, (2011)An Almost Non-interactive Order Preserving Encryption Scheme., , , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 87-100. Springer, (2018)Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach., , , и . ProvSec, том 9451 из Lecture Notes in Computer Science, стр. 215-226. Springer, (2015)A Semantic Retrieval Framework for Engineering Domain Knowledge., , , и . ICIC (1), том 6838 из Lecture Notes in Computer Science, стр. 488-493. Springer, (2011)An Efficient Secure Dynamic Skyline Query Model., , , , , , и . CoRR, (2020)Secure multi-server-aided data deduplication in cloud computing., , , и . Pervasive Mob. Comput., (2015)Blockchain-based multiple groups data sharing with anonymity and traceability., , и . Sci. China Inf. Sci., (2020)Privacy-preserving authentication for general directed graphs in industrial IoT., , , и . Inf. Sci., (2019)Wearable Ankle Robots in Post-stroke Rehabilitation of Gait: A Systematic Review., , , , , , , и . Frontiers Neurorobotics, (2019)Identity-Based Chameleon Hash Scheme Without Key Exposure., , , и . IACR Cryptology ePrint Archive, (2009)