From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices.. IEEE Communications Letters, 5 (2): 61-63 (2001)On the Security of Chien's Ultralightweight RFID Authentication Protocol., , и . IEEE Trans. Dependable Secur. Comput., 8 (2): 315-317 (2011)On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme., , и . IEEE Trans. Dependable Secur. Comput., 6 (2): 159-160 (2009)Data embedding in image-media using weight-function on modulo operations., , , и . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID., , , , , и . J. Inf. Hiding Multim. Signal Process., 5 (4): 642-648 (2014)A Gen2-Based RFID Authentication Protocol for Security and Privacy., и . IEEE Trans. Mob. Comput., 8 (8): 1052-1062 (2009)On Private-Key Cryptosystems Based on Product Codes., и . ACISP, том 1438 из Lecture Notes in Computer Science, стр. 68-79. Springer, (1998)DepenDNS: Dependable Mechanism against DNS Cache Poisoning., , , и . CANS, том 5888 из Lecture Notes in Computer Science, стр. 174-188. Springer, (2009)Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits., , , , и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 49-63. Springer, (2008)Secure broadcasting in large networks., и . Comput. Commun., 21 (3): 279-283 (1998)