From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Lightweight Fast Handover Authentication Scheme in Mobile Networks., , , и . ICC, стр. 1-5. IEEE, (2009)Security Analysis and Improvement of the Global Key Recovery System., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 17-24. Springer, (2002)A Privacy Preserving Rental System., и . ISC, том 3650 из Lecture Notes in Computer Science, стр. 59-73. Springer, (2005)Towards Lightweight Anonymous Entity Authentication for IoT Applications., , , , и . ACISP (1), том 9722 из Lecture Notes in Computer Science, стр. 265-280. Springer, (2016)Practical private data matching deterrent to spoofing attacks., , и . CIKM, стр. 852-853. ACM, (2006)Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud., , , и . ACISP (1), том 10342 из Lecture Notes in Computer Science, стр. 127-144. Springer, (2017)Modeling TCG-Based Secure Systems with Colored Petri Nets., , , , и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 67-86. Springer, (2010)Privacy and Ownership Preserving of Outsourced Medical Data., , , и . ICDE, стр. 521-532. IEEE Computer Society, (2005)A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises., , и . SEC, том 181 из IFIP, стр. 95-112. Springer, (2005)Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems., и . ISPEC, том 4464 из Lecture Notes in Computer Science, стр. 284-300. Springer, (2007)