From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage., , и . ICS, том 1013 из Communications in Computer and Information Science, стр. 599-607. Springer, (2018)A new remote user authentication scheme for multi-server architecture., , и . Future Gener. Comput. Syst., 19 (1): 13-22 (2003)A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Images., , и . ICMHI, стр. 287-292. ACM, (2023)An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem., и . ATC, том 4158 из Lecture Notes in Computer Science, стр. 601-610. Springer, (2006)An Efficient Steganography Scheme for M-Commerce., , и . IIH-MSP, стр. 122-125. IEEE Computer Society, (2007)A Certificate Management Mechanism Using Distributed Ledger., , и . AsiaJCIS, стр. 66-72. IEEE, (2023)A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System., и . IIH-MSP, стр. 31-33. IEEE Computer Society, (2010)A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress., , и . Infoscale, том 304 из ACM International Conference Proceeding Series, стр. 69. ACM, (2007)Halftone image resampling by interpolation and error-diffusion., , и . ICUIMC, стр. 409-413. ACM, (2008)Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach., и . Informatica, 16 (1): 37-44 (2005)