From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds., , и . IIH-MSP (1), том 81 из Smart Innovation, Systems and Technologies, стр. 198-205. Springer, (2017)Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol., , , , , и . J. Inf. Sci. Eng., 34 (2): 371-390 (2018)Cryptanalysis of Än Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"., , , , и . ICISA, том 424 из Lecture Notes in Electrical Engineering, стр. 282-289. Springer, (2017)A Public Auditing Scheme with Data Recovery., , , , и . ICGEC, том 834 из Advances in Intelligent Systems and Computing, стр. 595-602. Springer, (2018)A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps., , и . IEEE Access, (2018)SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing., , , , и . Symmetry, 14 (7): 1393 (2022)On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor., , , и . IIH-MSP (1), том 109 из Smart Innovation, Systems and Technologies, стр. 171-177. Springer, (2018)Efficient Mining of Fuzzy Frequent Itemsets with Type-2 Membership Functions., , , , и . ACIIDS (2), том 9622 из Lecture Notes in Computer Science, стр. 191-200. Springer, (2016)Towards Time-Bound Hierarchical Key Management in Cloud Computing., , , , и . ECC (1), том 297 из Advances in Intelligent Systems and Computing, стр. 31-38. Springer, (2014)Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (10): 2638-2640 (2009)