From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Optimistic Fair Protocol for P2P Chained Transaction., , и . ASIAN, том 3818 из Lecture Notes in Computer Science, стр. 136-145. Springer, (2005)Building Trusted Sub-domain for the Grid with Trusted Computing., , и . Inscrypt, том 4990 из Lecture Notes in Computer Science, стр. 463-471. Springer, (2007)A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs., , , и . Integr., (2020)A Secure Multi-party Computing Model Based on Trusted Computing Platform., , и . CIT (2), стр. 318-322. IEEE Computer Society, (2009)978-0-7695-3836-5.On the degree of homogeneous bent functions., , , и . Discret. Appl. Math., 155 (5): 665-669 (2007)An Improved Global Trust Value Computing Method in P2P System., , , и . ATC, том 4158 из Lecture Notes in Computer Science, стр. 258-267. Springer, (2006)Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions., , и . ProvSec, том 14217 из Lecture Notes in Computer Science, стр. 186-206. Springer, (2023)Certificateless One-Way Authenticated Two-Party Key Agreement Protocol., , , , и . IAS, стр. 483-486. IEEE Computer Society, (2009)VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach., , , и . WKDD, стр. 594-600. IEEE Computer Society, (2008)The Simplified Inductive Approach to Verifying Security Protocols., , и . ISECS, стр. 523-526. IEEE Computer Society, (2008)