From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Strong Identity-Based Proxy Signature Schemes, Revisited., , , и . Wirel. Commun. Mob. Comput., (2018)Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications., , и . Wireless Personal Communications, 97 (2): 3017-3030 (2017)k-time Proxy Signature: Formal Definition and Efficient Construction., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 154-164. Springer, (2013)Dynamic Group Key Exchange Revisited., и . CANS, том 6467 из Lecture Notes in Computer Science, стр. 261-277. Springer, (2010)Hierarchical Functional Encryption for Linear Transformations., , , и . ACISP (1), том 10342 из Lecture Notes in Computer Science, стр. 23-43. Springer, (2017)Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups., , , , , и . IEEE Access, (2019)An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices., , и . Theor. Comput. Sci., 378 (2): 198-207 (2007)A note on the strong authenticated key exchange with auxiliary inputs., , , , , и . Des. Codes Cryptogr., 85 (1): 175-178 (2017)Two-factor mutual authentication based on smart cards and passwords., , , и . J. Comput. Syst. Sci., 74 (7): 1160-1172 (2008)Strongly leakage resilient authenticated key exchange, revisited., , , , , и . Des. Codes Cryptogr., 87 (12): 2885-2911 (2019)