From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing efficient proxy signature schemes for mobile communication., , и . Sci. China Ser. F Inf. Sci., 51 (2): 183-195 (2008)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , и . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Smart community: an internet of things application., , , , , и . IEEE Commun. Mag., 49 (11): 68-75 (2011)Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud., , , и . IEEE Trans. Cloud Comput., 11 (1): 879-896 (января 2023)Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment., , , , , , и . IEEE Commun. Mag., 56 (5): 20-21 (2018)Age-Optimal Network Coding HARQ Transmission Scheme for Dual-Hop Satellite-Integrated Internet., , , , , , и . IEEE Trans. Veh. Technol., 71 (10): 10666-10682 (2022)Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system., , , и . J. Parallel Distributed Comput., (2017)An enhanced authenticated key agreement protocol for wireless mobile communication., , и . Comput. Stand. Interfaces, 29 (6): 647-652 (2007)Non-interactive deniable authentication protocol based on factoring., и . Comput. Stand. Interfaces, 27 (4): 401-405 (2005)Extended Moving Target Defense for AC State Estimation in Smart Grids., , , , и . IEEE Trans. Smart Grid, 14 (3): 2313-2325 (мая 2023)