From post

Developing the Analysis Tool of Cyber-Attacks by Using CTI and Attributes of Organization.

, , , , , и . AINA Workshops, том 927 из Advances in Intelligent Systems and Computing, стр. 673-682. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sanitizable and Deletable Signature., , , , и . WISA, том 5379 из Lecture Notes in Computer Science, стр. 130-144. Springer, (2008)On the Strength Comparison of the ECDLP and the IFP., , , и . SCN, том 7485 из Lecture Notes in Computer Science, стр. 302-325. Springer, (2012)Yet Another Sanitizable Signature from Bilinear Maps., , , , и . ARES, стр. 941-946. IEEE Computer Society, (2009)Elliptic Curve Scalar Multiplication with a Bijective Transform., , и . IMIS, стр. 280-286. IEEE Computer Society, (2014)Improving the Confidential Data Totalization., , и . IMIS, стр. 826-830. IEEE Computer Society, (2013)Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve., , , , и . Public Key Cryptography, том 7293 из Lecture Notes in Computer Science, стр. 595-608. Springer, (2012)PIATS: A Partially Sanitizable Signature Scheme., , , и . ICICS, том 3783 из Lecture Notes in Computer Science, стр. 72-83. Springer, (2005)Improving the Randomized Initial Point Countermeasure Against DPA., , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 459-469. (2006)CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method., , и . CHES, том 4727 из Lecture Notes in Computer Science, стр. 364-377. Springer, (2007)Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices., , , и . WISA, том 3786 из Lecture Notes in Computer Science, стр. 232-242. Springer, (2005)