From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services., , и . IEEE Syst. J., 12 (2): 2039-2042 (2018)New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , и . GLOBECOM, стр. 1-6. IEEE, (2019)Publicly verifiable database scheme with efficient keyword search., , , и . Inf. Sci., (2019)Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation., , , , , и . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (ноября 2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , и . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (мая 2023)A fair data access control towards rational users in cloud storage., , , , и . Inf. Sci., (2017)TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , и . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., и . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)Efficient and Identity-based Signcryption with Provably-secure., , и . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)