From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Extended CTRT for AES-256., , , , , , , и . WISA, том 11897 из Lecture Notes in Computer Science, стр. 79-91. Springer, (2019)A Study on 5G Security Activities in Japan.. MobiSec, том 1644 из Communications in Computer and Information Science, стр. 33-47. Springer, (2022)A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size., , и . ICN (2), том 3421 из Lecture Notes in Computer Science, стр. 944-952. Springer, (2005)Leakage-Resilient Authenticated Key Establishment Protocols., , и . ASIACRYPT, том 2894 из Lecture Notes in Computer Science, стр. 155-172. Springer, (2003)Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2092-2095 (2010)An Investigation of PSA Certified., , , , и . ARES, стр. 97:1-97:8. ACM, (2022)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , и . EuroPKI, том 3545 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2005)Authenticated key exchange for wireless security., , и . WCNC, стр. 1180-1186. IEEE, (2005)Protocols for purpose-restricted anonymous communications in IP-based wireless networks., , , и . Comput. Commun., 31 (15): 3662-3671 (2008)A New Security Architecture for Personal Networks., , , , , и . GLOBECOM, IEEE, (2006)