From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Overview of Security and Privacy Issues for Internet of Things.. IEICE Trans. Inf. Syst., 100-D (8): 1649-1662 (2017)A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature., и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 208-220. Springer, (1999)Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector., , и . AsiaJCIS, стр. 62-68. IEEE Computer Society, (2018)Message from the General Co-Chairs: AsiaJCIS 2022., , , и . AsiaJCIS, стр. vii. IEEE, (2022)A study on behavior-based mobile malware analysis system against evasion techniques., , , и . ICOIN, стр. 455-457. IEEE Computer Society, (2016)Secure and Lightweight Authentication Protocol for NFC Tag Based Services., и . AsiaJCIS, стр. 63-68. IEEE Computer Society, (2015)Extensible Authentication Protocol Overview and Its Applications.. IEICE Trans. Inf. Syst., 92-D (5): 766-776 (2009)An Overview of De-Identification Techniques and Their Standardization Directions.. IEICE Trans. Inf. Syst., 103-D (7): 1448-1461 (2020)USN Middleware Security Model., , , и . WISA, том 5932 из Lecture Notes in Computer Science, стр. 354-365. Springer, (2009)An µTESLA Protocols with Multi-senders Based on a 2-Level XOR Chain with Data-Loss Tolerance., и . SAINT, стр. 269-272. IEEE Computer Society, (2010)