From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking Android smartphone systems without permissions., , , и . PST, стр. 147-156. IEEE, (2016)SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications., , , , и . CODASPY, стр. 299-306. ACM, (2018)A Security and Performance Evaluation of Hash-Based RFID Protocols., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 406-424. Springer, (2008)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy., , , , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 184-204. Springer, (2019)Design and Implementation of a Secure Prototype for EPCglobal Network Services., , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)Accountable and Fine-Grained Controllable Rewriting in Blockchains., , , , и . IEEE Trans. Inf. Forensics Secur., (2023)A new framework for privacy-preserving biometric-based remote user authentication., , , , , и . J. Comput. Secur., 28 (4): 469-498 (2020)Leakage Resilient Password Systems, , и . Springer Briefs in Computer Science Springer, (2015)