From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Advances in secure and intelligent data processing., , , и . Concurr. Comput. Pract. Exp., 26 (5): 1021-1022 (2014)Special issue on security and privacy for smart cities., , , и . Pers. Ubiquitous Comput., 21 (5): 775 (2017)Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT., , , , и . IEEE Trans. Computers, 72 (5): 1384-1395 (мая 2023)Universal product learning with errors: A new variant of LWE for lattice-based cryptography., и . Theor. Comput. Sci., (2022)Cooperative Technology Innovation Factors Identification and Analysis in the Manufacturing Virtual Industry Cluster., , , и . J. Uncertain Syst., 15 (1): 2250002:1-2250002:14 (2022)Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks., , , и . Int. J. Secur. Networks, 5 (1): 35-44 (2010)Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT., и . Future Gener. Comput. Syst., (2018)Redactable Blockchain in Decentralized Setting., , , , и . IEEE Trans. Inf. Forensics Secur., (2022)Accountable and Fine-Grained Controllable Rewriting in Blockchains., , , , и . IEEE Trans. Inf. Forensics Secur., (2023)Constructions of certificate-based signature secure against key replacement attacks., , , , и . J. Comput. Secur., 18 (3): 421-449 (2010)