From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance analysis of two bridged CSMA/CD networks., , , , и . Comput. Commun., 16 (8): 501-510 (1993)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , и . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Design and Implementation of a Secure Prototype for EPCglobal Network Services., , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Fortifying password authentication in integrated healthcare delivery systems., , и . AsiaCCS, стр. 255-265. ACM, (2006)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , и . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud., , , и . IEEE Trans. Serv. Comput., 14 (1): 222-234 (2021)Empirical Study of Face Authentication Systems Under OSNFD Attacks., , , , и . IEEE Trans. Dependable Secur. Comput., 15 (2): 231-245 (2018)Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language., , и . IEEE Trans. Dependable Secur. Comput., 17 (2): 320-334 (2020)