From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information., , , и . ICISSP, стр. 373-378. SciTePress, (2018)Mobility management in VANET., , и . WOCC, стр. 298-303. IEEE, (2013)A new efficient optimistic fair exchange protocol without random oracles., , , и . Int. J. Inf. Sec., 11 (1): 53-63 (2012)A lattice-based public key encryption scheme with delegated equality test., , , , и . Comput. Stand. Interfaces, (января 2024)Post-quantum secure group signature with verifier local revocation and backward unlinkability., , , , и . Comput. Stand. Interfaces, (марта 2024)Signature Scheme from Trapdoor Functions., , , , и . J. Internet Serv. Inf. Secur., 9 (2): 31-41 (2019)Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited., , и . ACISP, том 8544 из Lecture Notes in Computer Science, стр. 274-289. Springer, (2014)A Novel Certificateless Multi-signature Scheme over NTRU Lattices., , и . ISPEC, том 13107 из Lecture Notes in Computer Science, стр. 345-362. Springer, (2021)A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model., , и . ProvSec, том 10005 из Lecture Notes in Computer Science, стр. 320-339. (2016)Sequence aware functional encryption and its application in searchable encryption., , , , и . J. Inf. Secur. Appl., (2017)