From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum-Safe Puncturable Signatures With Their Application in Blockchain., , , и . IEEE Trans. Inf. Forensics Secur., (2024)A 30 nA, 6.6 ppm/°C, high PSRR subthreshold CMOS voltage reference., , и . ASICON, стр. 1-4. IEEE, (2015)Location-based data access control scheme for Internet of Vehicles., , , , и . Comput. Electr. Eng., (2020)Using channel pruning-based YOLO v4 deep learning algorithm for the real-time and accurate detection of apple flowers in natural environments., , , и . Comput. Electron. Agric., (2020)A real-time fall detection system based on HMM and RVM., , , и . VCIP, стр. 1-6. IEEE, (2013)A 0.4 V 298 nJ/op Neural Signal Spectral Feature Extraction Module With Novel Approximate MACs and Custom Compressors., , , , , , , и . IEEE Trans. Circuits Syst. II Express Briefs, 66-II (10): 1733-1737 (2019)Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security., , , , , и . AsiaCCS, стр. 408-422. ACM, (2022)Crochemore's Repetitions Algorithm Revisited: Computing Runs., и . Int. J. Found. Comput. Sci., 23 (2): 389-401 (2012)Substring-searchable attribute-based encryption and its application for IoT devices., , , , , , и . Digit. Commun. Networks, 7 (2): 277-283 (2021)Wildcarded identity-based encryption from lattices., , , , и . Theor. Comput. Sci., (2022)