From post

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.

, , , , и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 159-178. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters., , , , , и . ICITS, том 10015 из Lecture Notes in Computer Science, стр. 3-23. (2016)Travelling waves and global attractivity of an SIRS disease model with spatial diffusion and temporary immunity., и . Appl. Math. Comput., (2013)Study of Dynamic Group Evolution for Health Prediction of Mangrove Ecosystem., , , , , и . IIAI-AAI, стр. 79-84. IEEE, (2019)Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation., , , , и . Quantum Inf. Process., 11 (6): 1359-1369 (2012)A Reconfigurable Dual-Band Dual-Circularly Polarized Antenna for Vehicle Global Navigation Satellite System Application., , , , и . IEEE Trans. Veh. Technol., 69 (10): 11857-11867 (2020)Instant messaging user geolocating method based on multi-source information association., , , , и . Int. J. Sens. Networks, 35 (2): 99-110 (2021)A Novel Cross Layer Anti-Collision Algorithm for Slotted ALOHA-Based UHF RFID Systems., , , , , , , и . IEEE Access, (2019)Dynamic Spare Point Application Based Coordination Strategy for Multi-AGV Systems in a WIP Warehouse Environment., , , и . IEEE Access, (2022)Dynamic analysis and application of a dengue transmission model with vaccination and incubation delays., и . J. Appl. Math. Comput., 69 (1): 895-920 (февраля 2023)Mathematical analysis of a delayed HIV infection model with saturated CTL immune response and immune impairment., и . J. Appl. Math. Comput., 68 (4): 2365-2380 (августа 2022)