From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bidirectional Mobile Offloading in LTE-U and WiFi Coexistence Systems., , , и . VTC Fall, стр. 1-6. IEEE, (2018)Efficient Federated Learning using Random Pruning in Resource-Constrained Edge Intelligence Networks., , , , , и . GLOBECOM, стр. 5244-5249. IEEE, (2023)EKE Meets Tight Security in the Universally Composable Framework., , , и . Public Key Cryptography (1), том 13940 из Lecture Notes in Computer Science, стр. 685-713. Springer, (2023)Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications., , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 664-673. Springer, (2020)Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing., и . Public Key Cryptography, том 8383 из Lecture Notes in Computer Science, стр. 19-36. Springer, (2014)Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter., и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 381-400. Springer, (2013)Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 203-213. Springer, (2002)Efficient Leakage-Resilient Identity-Based Encryption with CCA Security., , и . Pairing, том 8365 из Lecture Notes in Computer Science, стр. 149-167. Springer, (2013)Authenticated Key Exchange and Signatures with Tight Security in the Standard Model., , , , , , и . CRYPTO (4), том 12828 из Lecture Notes in Computer Science, стр. 670-700. Springer, (2021)Multi-hop Fine-Grained Proxy Re-encryption., , и . Public Key Cryptography (4), том 14604 из Lecture Notes in Computer Science, стр. 161-192. Springer, (2024)