From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification., , и . Inf. Sci., 177 (2): 543-549 (2007)A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration., , , , и . Wirel. Pers. Commun., 77 (3): 1775-1800 (2014)Multivariate Time-Series Anomaly Detection in IoT with a Bi-Dual GM GRU Autoencoder., , , , и . COMPSAC, стр. 746-754. IEEE, (2024)Novel designated ownership transfer with grouping proof., , , и . DSC, стр. 433-440. IEEE, (2017)Analysis and design of a smart card based authentication protocol., , и . Journal of Zhejiang University - Science C, 14 (12): 909-917 (2013)Recursive protocol for group-oriented authentication with key distribution., , , и . J. Syst. Softw., 81 (7): 1227-1239 (2008)Efficient and secure three-party authenticated key exchange protocol for mobile environments., , , и . Journal of Zhejiang University - Science C, 14 (5): 347-355 (2013)Preserving indomitable DDoS vitality through resurrection social hybrid botnet., , , , и . Comput. Secur., (2021)New dynamic ID authentication scheme using smart cards., , и . Int. J. Commun. Syst., 23 (12): 1449-1462 (2010)Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems., , , , , и . IEEE Access, (2020)