From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles., , и . CIS (2), стр. 308-313. IEEE Computer Society, (2008)978-0-7695-3508-1.Attacking the Dialogue System at Smart Home., , , , и . CollaborateCom (1), том 349 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 148-158. Springer, (2020)Distributing the Keys into P2P Network., , и . GCC (1), том 3032 из Lecture Notes in Computer Science, стр. 460-463. Springer, (2003)Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System., , и . IEEE Internet Things J., 11 (3): 3896-3908 (февраля 2024)Managing an Information System Transformation in Higher Educational Institutions: A Case Study on CMC Portal in Ghana., , и . Int. J. Emerg. Technol. Learn., 14 (22): 232-251 (2019)A cascaded framework with cross-modality transfer learning for whole heart segmentation., , , , , , и . Pattern Recognit., (марта 2024)An efficient conditionally anonymous ring signature in the random oracle model., , и . Theor. Comput. Sci., (2012)Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience., , , и . BigCom, том 9784 из Lecture Notes in Computer Science, стр. 387-395. Springer, (2016)IAC: Interest-Aware Caching for Unstructured P2P., , , и . SKG, стр. 58. IEEE Computer Society, (2006)Propagation Model of Active Worms in P2P Networks., , , и . ICYCS, стр. 1908-1912. IEEE Computer Society, (2008)