From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Representation Model of Trust Relationships with Delegation Extensions., , и . iTrust, том 3477 из Lecture Notes in Computer Science, стр. 116-130. Springer, (2005)NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU., , и . AsiaCCS, стр. 179-189. ACM, (2015)Escrowed decryption protocols for lawful interception of encrypted data., , и . IET Inf. Secur., 13 (5): 498-507 (2019)A Blockchain Approach for Decentralized V2X (D-V2X)., , и . IEEE Trans. Veh. Technol., 70 (5): 4001-4010 (2021)Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services., , и . CloudCom, стр. 241-248. IEEE Computer Society, (2012)Security assurance during the software development cycle., , и . CompSysTech, стр. 20. ACM, (2009)Secure Real-Time Integration of Services in a OSGi Distributed Environment., , и . NCM (1), стр. 631-635. IEEE Computer Society, (2008)Integration of MPC into Besu through an extended private transaction model., , и . MetaCom, стр. 266-273. IEEE, (2023)A Task Ordering Approach for Automatic Trust Establishment., , , и . ESSoS, том 7159 из Lecture Notes in Computer Science, стр. 75-88. Springer, (2012)A Parametric Family of Attack Models for Proxy Re-encryption., , и . CSF, стр. 290-301. IEEE Computer Society, (2015)