From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment., , и . ICCSP, стр. 40-44. ACM, (2018)On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings.. ISPEC, том 5451 из Lecture Notes in Computer Science, стр. 47-58. Springer, (2009)An Efficient Proxy Signature Scheme with Full-delegation., и . ICNSC, стр. 513-518. IEEE, (2008)Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme., и . INCoS, стр. 473-476. IEEE, (2012)Security Analysis of Two Signature Schemes and Their Improved Schemes., и . ICCSA (1), том 4705 из Lecture Notes in Computer Science, стр. 589-602. Springer, (2007)An Improved Group Signature Scheme., , и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 185-194. Springer, (2005)Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing., , , и . Secur. Commun. Networks, (2021)Designated-Verifier Chameleon Proxy Signature., , и . Int. J. Distributed Sens. Networks, 5 (1): 29 (2009)Efficient public verification proof of retrievability scheme in cloud., , и . Clust. Comput., 17 (4): 1401-1411 (2014)Recognizing Chaos by Deep Learning and Transfer Learning on Recurrence Plots., , , , , и . Int. J. Bifurc. Chaos, 33 (10): 2350116:1-2350116:13 (августа 2023)