From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications., , , и . IEEE Trans. Multim., 22 (1): 82-95 (2020)Counterexample of truncated Costas optical orthogonal codes., , и . IEEE Trans. Commun., 45 (6): 640-643 (1997)Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product., , , , , и . IEEE Access, (2019)Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks., , и . IEEE Internet Things J., 8 (11): 8897-8909 (2021)A secure and efficient privacy-preserving data aggregation algorithm., , , и . J. Ambient Intell. Humaniz. Comput., 13 (3): 1495-1503 (2022)Secure ABE Scheme for Access Management in Blockchain-Based IoT., , , , и . IEEE Access, (2021)Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management., , , и . J. Softw., 8 (6): 1526-1535 (2013)A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure., , , , и . KSII Trans. Internet Inf. Syst., 8 (12): 4552-4567 (2014)Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks., , , и . KSII Trans. Internet Inf. Syst., 10 (3): 1273-1288 (2016)Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model., , , и . KSII Trans. Internet Inf. Syst., 10 (5): 2427-2445 (2016)