From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments., , , и . Inf. Syst. E Bus. Manag., 6 (1): 25-48 (2008)Provably secure robust optimistic fair exchange of distributed signatures., , , , , и . Future Gener. Comput. Syst., (2016)An optimized authentication protocol for mobile network reconsidered.. ACM SIGMOBILE Mob. Comput. Commun. Rev., 6 (4): 74-76 (2002)Energy-Efficient Distance-Bounding with Residual Charge Computation., , , , и . IEEE Trans. Emerg. Top. Comput., 8 (2): 365-376 (2020)Improved Efficient Remote User Authentication Schemes., , и . Int. J. Netw. Secur., 4 (2): 149-154 (2007)Security of federated learning for cloud-edge intelligence collaborative computing., , , , , и . Int. J. Intell. Syst., 37 (11): 9290-9308 (2022)User-Defined Privacy Grid System for Continuous Location-Based Services., , , и . IEEE Trans. Mob. Comput., 14 (10): 2158-2172 (2015)How to protect privacy in Optimistic Fair Exchange of digital signatures., , и . Inf. Sci., (2015)Generic Transformation from Weakly to Strongly Unforgeable Signatures., , , и . J. Comput. Sci. Technol., 23 (2): 240-252 (2008)Revocable Ring Signature., , , , и . J. Comput. Sci. Technol., 22 (6): 785-794 (2007)