From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Algebra model and security analysis for cryptographic protocols., и . Sci. China Ser. F Inf. Sci., 47 (2): 199-220 (2004)SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric., , , , , и . CBD, стр. 224-229. IEEE, (2021)Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method., , , и . MSN, том 3794 из Lecture Notes in Computer Science, стр. 1073-1080. Springer, (2005)Distributed Access Control in CROWN Groups., , , и . ICPP, стр. 435-442. IEEE Computer Society, (2005)Privacy-Preserving Trajectory Publication against Parking Point Attacks., , , и . UIC/ATC, стр. 569-574. IEEE Computer Society, (2013)Dynamic Social Recommendation with High-Matching Inhomogeneous Relations., , , , , и . SMC, стр. 526-533. IEEE, (2023)Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks., , , , , и . Healthcom, стр. 1-6. IEEE, (2017)A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data., , , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 460-473. Springer, (2016)A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things., , , , и . IEEE Trans. Computers, 73 (7): 1669-1682 (июля 2024)CRFLOE: Context Region Filter and Relation Word Aware for Document-Level Relation Extraction., , , , и . ICIC (LNAI 3), том 14877 из Lecture Notes in Computer Science, стр. 102-114. Springer, (2024)