From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the coefficients of the polynomial in the number field sieve., , , , и . Sci. China Inf. Sci., 58 (11): 1-9 (2015)Quantum protocols for secure multi-party summation., , , , , и . Quantum Inf. Process., 18 (6): 168 (2019)A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace., , , , и . Secur. Commun. Networks, (2017)An Adaptive Service Strategy Based on User Rating in P2P., , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 860-870. Springer, (2005)Integrity Protection and Attestation of Security Critical Executions on Virtualized Platform in Cloud Computing Environment., и . GreenCom/iThings/CPScom, стр. 2071-2075. IEEE, (2013)Evolution Cipher against Differential Power Attack., , , и . J. Digit. Content Technol. its Appl., 4 (7): 177-189 (2010)Secure Key Management of Mobile Agent System Using TPM-Based Technology on Trusted Computing Platform., , и . CSSE (3), стр. 1020-1023. IEEE Computer Society, (2008)978-0-7695-3336-0.A Trusted Computing Model Based on Code Authorization., , и . ISIP, стр. 495-499. IEEE Computer Society, (2008)A Worm Containment Model Based on Neighbor-Alarm., , и . ATC, том 4610 из Lecture Notes in Computer Science, стр. 449-457. Springer, (2007)Grid System Integrated with Trusted Computing Platform., , , , и . IMSCCS (1), стр. 619-625. IEEE Computer Society, (2006)