From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Provably Secure Homomorphic Signcryption., , , и . ProvSec, том 10592 из Lecture Notes in Computer Science, стр. 349-360. Springer, (2017)Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs., , и . IEEE Trans. Inf. Forensics Secur., 9 (1): 5-13 (2014)Policy-Based Authentication for Mobile Agents., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 123-137. Springer, (2011)Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts., , , и . Int. J. Inf. Sec., 17 (4): 463-475 (2018)Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes., , , и . Int. J. Inf. Sec., 17 (5): 533-548 (2018)Efficient identity-based online/offline encryption and signcryption with short ciphertext., , и . Int. J. Inf. Sec., 16 (3): 299-311 (2017)How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis., , и . Int. J. Netw. Secur., 4 (2): 138-148 (2007)Identity-based encryption with leakage-amplified chosen-ciphertext attacks security., , , , и . Theor. Comput. Sci., (2020)Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain., , , , , и . IEEE Trans. Ind. Informatics, 16 (4): 2677-2686 (2020)Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting., , и . Wireless Personal Communications, 94 (3): 1017-1034 (2017)