From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Misuse of RC4 in Microsoft Word and Excel.. IACR Cryptology ePrint Archive, (2005)Related-Cipher Attacks.. ICICS, том 2513 из Lecture Notes in Computer Science, стр. 447-455. Springer, (2002)Worst-Case Analysis is Maximum-A-Posteriori Estimation., и . CoRR, (2023)Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data., , , , , и . IEEE Trans. Dependable Secur. Comput., 18 (4): 1667-1680 (2021)An Intelligent Scheduling Access Privacy Protection Model of Electric Vehicle Based on 5G-V2X., , , , , и . Sci. Program., (2021)Resynchronization Attacks on WG and LEX., и . FSE, том 4047 из Lecture Notes in Computer Science, стр. 422-432. Springer, (2006)W-ART: Action Relation Transformer for Weakly-Supervised Temporal Action Localization., , , , , и . ICASSP, стр. 2195-2199. IEEE, (2022)Transtl: Spatial-Temporal Localization Transformer for Multi-Label Video Classification., , , , , и . ICASSP, стр. 1965-1969. IEEE, (2022)URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications., и . CNS, стр. 697-698. IEEE, (2015)Cryptanalysis of the Stream Cipher ABC v2., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 56-66. Springer, (2006)