From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 203-213. Springer, (2002)EKE Meets Tight Security in the Universally Composable Framework., , , и . Public Key Cryptography (1), том 13940 из Lecture Notes in Computer Science, стр. 685-713. Springer, (2023)Decentralized Radio Resource Adaptation in D2D-U Networks., , , , , и . IEEE Internet Things J., 8 (8): 6720-6732 (2021)QANIZK for adversary-dependent languages and their applications., , и . Theor. Comput. Sci., (2019)Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption., , , и . Cryptogr., 2 (4): 33 (2018)Efficient Federated Learning using Random Pruning in Resource-Constrained Edge Intelligence Networks., , , , , и . GLOBECOM, стр. 5244-5249. IEEE, (2023)Bidirectional Mobile Offloading in LTE-U and WiFi Coexistence Systems., , , и . VTC Fall, стр. 1-6. IEEE, (2018)Generic Construction of 1-out-of-n Oblivious Signatures., , и . IEICE Trans. Inf. Syst., 105-D (11): 1836-1844 (ноября 2022)A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination., , и . Secur. Commun. Networks, (2021)Efficient chosen ciphertext secure public-key encryption under factoring assumption., и . Secur. Commun. Networks, 6 (3): 351-360 (2013)