From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Full Security: Fuzzy Identity Based Encryption., и . IACR Cryptology ePrint Archive, (2008)Multi-Gigabit over Copper Access Networks: Architectural Evolution and Techno-Economic Analysis., , , , , , и . IEEE Communications Magazine, 57 (8): 22-27 (2019)Data protection based on multifunction digital watermark in wireless sensor network., , , и . ICCST, стр. 37-41. IEEE, (2015)Privacy Protection for Medical Data Sharing in Smart Healthcare., , , , , , и . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 100:1-100:18 (2020)A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks., , , , , и . IEEE Trans. Ind. Informatics, 17 (6): 4260-4269 (2021)A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system., , , , и . Des. Codes Cryptogr., 86 (11): 2587-2603 (2018)Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search., , , и . Theor. Comput. Sci., (2012)Code Synthesis for Dataflow-Based Embedded Software Design., , , , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (1): 49-61 (2022)A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs., , , , и . IEEE Access, (2020)Challenges and Solutions in Vectored DSL., , , , и . AccessNets, том 37 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 192-203. Springer, (2009)