From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threshold password authentication against guessing attacks in Ad hoc networks., , и . Ad Hoc Networks, 5 (7): 1046-1054 (2007)Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications., , и . Concurr. Comput. Pract. Exp., 28 (4): 1145-1160 (2016)A secure anonymous routing protocol with authenticated key exchange for ad hoc networks., , , и . Comput. Stand. Interfaces, 29 (5): 521-527 (2007)Designated server-aided revocable identity-based keyword search on lattice., , , , и . EURASIP J. Wirel. Commun. Netw., 2021 (1): 174 (2021)LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing., , , , , и . IEEE Trans. Inf. Forensics Secur., 13 (1): 94-105 (2018)Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol., , , и . IEEE Commun. Lett., 12 (2): 149-151 (2008)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , и . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory., , и . Comput. J., 64 (8): 1264-1276 (2021)Improved RSA lossy trapdoor function and applications., , , и . Int. J. Inf. Comput. Secur., 14 (3/4): 229-241 (2021)