From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient single round attribute-based authenticated key exchange protocol., , и . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 313-336 (2021)Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 38-58. Springer, (2013)Perfectly Reliable Message Transmission., , и . Inf. Process. Lett., 100 (1): 23-28 (2006)Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks., , и . IACR Cryptology ePrint Archive, (2012)Identity Based Online/Offline Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2010)On Provably Secure Code-Based Signature and Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2012)Certificateless KEM and Hybrid Signcryption Schemes Revisited., , и . IACR Cryptology ePrint Archive, (2009)RSA-TBOS signcryption with proxy re-encryption., и . Digital Rights Management Workshop, стр. 59-66. ACM, (2008)Algorithms for Weighted Graph Problems on The Modified Cellular Graph Automaton., , и . RAIRO Theor. Informatics Appl., 23 (3): 251-279 (1989)Privacy Preserving DBSCAN Algorithm for Clustering., и . ADMA, том 4632 из Lecture Notes in Computer Science, стр. 57-68. Springer, (2007)