From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A research on new public-key encryption schemes., , и . Appl. Math. Comput., 169 (1): 51-61 (2005)An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage., , , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2019)Identity-and-data privacy forward security public auditing protocol in the standard model., и . Int. J. Commun. Syst., (2019)A hybrid news recommendation algorithm based on user's browsing path., и . ICIS, стр. 1-4. IEEE Computer Society, (2016)An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability., , , , , и . IMIS, стр. 81-88. IEEE Computer Society, (2012)Non-interactive Deniable Authentication Protocols., , и . Inscrypt, том 7537 из Lecture Notes in Computer Science, стр. 142-159. Springer, (2011)An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings., , , и . INCoS, стр. 318-322. IEEE, (2012)Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences., , , и . Appl. Math. Comput., 171 (2): 900-911 (2005)Short Group Signatures Without Random Oracles., , , , , и . J. Comput. Sci. Technol., 22 (6): 805-821 (2007)A non-delegatable strong designated verifier signature in ID-based setting for mobile environment., , , , , и . Math. Comput. Model., 58 (5-6): 1289-1300 (2013)