From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security flaws in authentication and key establishment protocols for mobile communications., и . Appl. Math. Comput., 169 (1): 62-74 (2005)The Risks of Compromising Secret Information.. ICICS, том 2513 из Lecture Notes in Computer Science, стр. 122-133. Springer, (2002)Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings., и . Appl. Math. Comput., 166 (3): 523-530 (2005)New DSA-Verifiable Signcryption Schemes., , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 35-47. Springer, (2002)Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.. ACISP, том 2119 из Lecture Notes in Computer Science, стр. 514-520. Springer, (2001)