From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Insecurity of an Identity Based Proxy Re-encryption Scheme., и . Fundam. Informaticae, 98 (2-3): 277-281 (2010)Fast elliptic curve scalar multiplication for resisting against SPA., , и . Int. J. Comput. Sci. Eng., 17 (3): 343-352 (2018)Improved outsourced private set intersection protocol based on polynomial interpolation., , , и . Concurr. Comput. Pract. Exp., (2018)Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart., , , , и . Int. J. Inf. Technol. Web Eng., 10 (3): 17-32 (2015)New public auditing protocol based on homomorphic tags for secure cloud storage., , , , и . Concurr. Comput. Pract. Exp., (2020)Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification., , , и . Inf. Sci., (2019)An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem., , , , , и . Int. J. Technol. Hum. Interact., 12 (2): 1-21 (2016)Improved secure fuzzy auditing protocol for cloud data storage., , , и . Soft Comput., 23 (10): 3411-3422 (2019)Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme., , , и . J. Syst. Softw., 84 (2): 219-225 (2011)New Identity Based Encryption And Its Proxy Re-encryption., и . IACR Cryptol. ePrint Arch., (2012)