From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data User-Based Attribute Based Encryption., , , и . CISS, стр. 1-5. IEEE, (2020)zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms., и . CoRR, (2024)Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems., , и . J. Circuits Syst. Comput., 25 (8): 1650097:1-1650097:20 (2016)Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems., , и . CoRR, (2019)Structural-based tunneling: preserving mutual anonymity for circular P2P networks., , , и . Int. J. Commun. Syst., 29 (3): 602-619 (2016)Multi-Authority Attribute-Based Access Control with Smart Contract., , и . ICBCT, стр. 6-11. ACM, (2019)An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play., , и . CoRR, (2019)C-trust: A trust management system to improve fairness on circular P2P networks., , , , и . Peer-to-Peer Netw. Appl., 9 (6): 1128-1144 (2016)Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution., , , и . CoRR, (2020)Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach., , и . CoRR, (2019)