From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs., , и . J. Ambient Intell. Humaniz. Comput., 7 (5): 681-692 (2016)A Deep Reinforcement Learning Scheme for SCMA-Based Edge Computing in IoT Networks., , и . GLOBECOM, стр. 5044-5049. IEEE, (2022)A Stochastic Geometry Model and Analysis Scheme for SCMA Aided Mobile Edge Computing., , , , , и . WCNC, стр. 1-6. IEEE, (2024)Forward Secure Conjunctive-Keyword Searchable Encryption., , , , , , и . IEEE Access, (2019)An Optimization Scheme for SCMA-Based Multi-Access Edge Computing., , и . VTC Spring, стр. 1-6. IEEE, (2021)Anonymous Identity-Based Encryption with Bounded Leakage Resilience., , , и . AINA Workshops, стр. 287-292. IEEE Computer Society, (2015)Grant-Free SCMA Enhanced Mobile Edge Computing: Protocol Design and Performance Analysis., , , , , и . IEEE Internet Things J., 11 (15): 25895-25909 (августа 2024)Learning-Based Latency and Energy Optimization in SCMA-Enhanced UAV-MEC Networks., , и . ICCC, стр. 1-6. IEEE, (2023)Enabling cloud storage auditing with key-exposure resilience under continual key-leakage., , , , , и . Inf. Sci., (2020)A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked., , и . MCAM, том 4577 из Lecture Notes in Computer Science, стр. 262-266. Springer, (2007)