From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient identity-based signature over NTRU lattice., , , и . Frontiers Inf. Technol. Electron. Eng., 17 (2): 135-142 (2016)Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing., , , , , , и . J. Cloud Comput., 12 (1): 174 (декабря 2023)An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information., , , , и . J. Inf. Process., (2021)End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach., , , , и . Ad Hoc Sens. Wirel. Networks, 29 (1-4): 265-285 (2015)Source delay in mobile ad hoc networks., , , и . Ad Hoc Networks, (2015)Optimized byzantine fault tolerant algorithm for improving performance and security with trust values., , , и . IET Blockchain, 4 (1): 1-17 (марта 2024)Leakage-Suppressed Range Query Scheme for Structured Data in IoT., , , и . IEEE Syst. J., 16 (3): 3531-3542 (2022)Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption., , , и . IEEE Syst. J., 15 (4): 5233-5244 (2021)AES-128 under HHL algorithm., , , и . Quantum Inf. Comput., 22 (3&4): 209-240 (2022)MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions., , , и . Future Gener. Comput. Syst., (2019)