From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security analysis of the generalized key agreement and password authentication protocol., , и . IEEE Communications Letters, 5 (11): 462-463 (2001)On the traceability on RSA-based partially signature with low computation., , , и . Appl. Math. Comput., 162 (1): 421-425 (2005)Probabilistic authenticated quantum dialogue., и . Quantum Inf. Process., 14 (12): 4631-4650 (2015)Quantum Key Recycling with optimal key recycling rate based on a noise level., , и . CoRR, (2020)Provably secure mutual authentication and key agreement scheme with user anonymity., и . ICICS, стр. 1-5. IEEE, (2013)Comment on "Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise"., , и . Quantum Inf. Process., 12 (8): 2871-2875 (2013)On the security of fair blind signature scheme using oblivious transfer., и . Comput. Commun., 22 (3): 287-290 (1999)Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space., , , и . CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 286-298. Springer, (1989)Remark on the Threshold RSA Signature Scheme., , и . CRYPTO, том 773 из Lecture Notes in Computer Science, стр. 413-420. Springer, (1993)Improved conference key distribution protocol based on a symmetric balanced incomplete block design., и . ACM SIGOPS Oper. Syst. Rev., 38 (3): 58-64 (2004)