From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective Botnet Detection Through Neural Networks on Convolutional Features., , и . TrustCom/BigDataSE, стр. 372-378. IEEE, (2018)Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries., и . IACR Cryptology ePrint Archive, (2004)A Threshold GQ Signature Scheme., , и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 137-150. Springer, (2003)A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring., , , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 544-560. Springer, (2012)Efficient Large-Scale Distributed Key Generation against Burst Interruption., , и . SECRYPT, стр. 197-203. INSTICC Press, (2007)A Framework of High Confidence E-Healthcare Information System., , , , и . ICWI, стр. 493-500. IADIS, (2003)Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems., и . SERE, стр. 187-195. IEEE, (2014)Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries., и . Public Key Cryptography, том 3386 из Lecture Notes in Computer Science, стр. 172-183. Springer, (2005)A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares., и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 207-224. Springer, (2001)Conditional Oblivious Cast., и . Public Key Cryptography, том 3958 из Lecture Notes in Computer Science, стр. 443-457. Springer, (2006)