From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and Efficient Trust Negotiation., , , , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 374-384. Springer, (2006)Sanitizable Signatures Revisited., , , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 80-97. Springer, (2008)Novel updatable identity-based hash proof system and its applications., , , и . Theor. Comput. Sci., (2020)Trust-oriented QoS-aware composite service selection based on genetic algorithms., , и . Concurr. Comput. Pract. Exp., 26 (2): 500-515 (2014)A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy., , , и . Inf. Sci., (2020)Policy-Based Authentication for Mobile Agents., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 123-137. Springer, (2011)A Secure Home Healthcare System Based on 6LoWPAN WSN., и . Int. J. Interdiscip. Telecommun. Netw., 6 (3): 15-26 (2014)Efficient Micropayment of Cryptocurrency from Blockchains., и . Comput. J., 62 (4): 507-517 (2019)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , и . IEEE Trans. Inf. Forensics Secur., 9 (1): 5-13 (2014)Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System., , , и . IEEE Access, (2019)