From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Implementation of a Secure Prototype for EPCglobal Network Services., , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy., , , , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 184-204. Springer, (2019)Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining., , и . Knowl. Inf. Syst., 17 (2): 217-240 (2008)Accountable and Fine-Grained Controllable Rewriting in Blockchains., , , , и . IEEE Trans. Inf. Forensics Secur., (2023)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Attacking Android smartphone systems without permissions., , , и . PST, стр. 147-156. IEEE, (2016)A new framework for privacy-preserving biometric-based remote user authentication., , , , , и . J. Comput. Secur., 28 (4): 469-498 (2020)Leakage Resilient Password Systems, , и . Springer Briefs in Computer Science Springer, (2015)Empirical Study of Face Authentication Systems Under OSNFD Attacks., , , , и . IEEE Trans. Dependable Secur. Comput., 15 (2): 231-245 (2018)