From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage., , , , и . GPC, том 9663 из Lecture Notes in Computer Science, стр. 63-81. Springer, (2016)Fully Deniable Message Authentication Protocols Preserving Confidentiality., , , и . Comput. J., 54 (10): 1688-1699 (2011)Threshold Proxy Re-encryption and Its Application in Blockchain., , , и . ICCCS (4), том 11066 из Lecture Notes in Computer Science, стр. 16-25. Springer, (2018)Secure universal designated verifier identity-based signcryption., , , , и . Secur. Commun. Networks, 7 (2): 434-444 (2014)Post-Quantum Cheating Detectable Private Information Retrieval., , , и . SEC, том 648 из IFIP Advances in Information and Communication Technology, стр. 431-448. Springer, (2022)Ideal Perfect Multilevel Threshold Secret Sharing Scheme., , и . IAS, стр. 118-121. IEEE Computer Society, (2009)The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism., , , и . Int. J. Ad Hoc Ubiquitous Comput., 17 (2/3): 162-173 (2014)Role-Based Signature and Its Security Proof., , и . J. Inf. Sci. Eng., 32 (6): 1525-1539 (2016)Full threshold change range of threshold changeable secret sharing., , , и . Des. Codes Cryptogr., 91 (7): 2421-2447 (2023)ID-Based Signcryption with Restrictive Unsigncryption., , и . INCoS, стр. 485-489. IEEE, (2013)