From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An improved dynamic provable data possession model., , и . CCIS, стр. 290-295. IEEE, (2011)Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher., , и . IACR Cryptology ePrint Archive, (2009)An extension of secure group communication using key graph., , , , и . Inf. Sci., 176 (20): 3060-3078 (2006)Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin., , и . J. Syst. Softw., 82 (2): 346-354 (2009)Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network., , , , и . ISNN (1), том 5551 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2009)An Empirical Study of SDK Credential Misuse in iOS Apps., , , и . APSEC, стр. 258-267. IEEE, (2018)Towards a Multi-Chain Future of Proof-of-Space., , , , , и . CoRR, (2019)Public key cryptosystems secure against memory leakage attacks., , , и . IET Inf. Secur., 10 (6): 403-412 (2016)Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization., , , , , и . J. Comput. Sci. Technol., 35 (5): 1175-1197 (2020)Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform., , , и . IEEE Trans. Very Large Scale Integr. Syst., 30 (9): 1158-1171 (2022)