From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement., , и . IEICE Trans. Commun., 91-B (3): 900-903 (2008)Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis., , , и . Int. J. Distributed Sens. Networks, (2015)Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor., , , , и . Secur. Commun. Networks, (2018)The Security Requirement for off-line E-cash system based on IC Card., , и . ICPADS (2), стр. 260-264. IEEE Computer Society, (2005)Traceable Anonymous Certificate., , , , и . RFC, (августа 2009)The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP)., , , , и . RFC, (августа 2010)Malware Similarity Analysis using API Sequence Alignments., , , , , и . J. Internet Serv. Inf. Secur., 4 (4): 103-114 (2014)A Method of Finding Bad Signatures in an RSA-Type Batch Verification., , , и . Informatica, 22 (2): 189-201 (2011)An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks., , , , , и . ISPA Workshops, том 4743 из Lecture Notes in Computer Science, стр. 60-68. Springer, (2007)The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment., , , , , и . ICPADS (2), стр. 55-60. IEEE Computer Society, (2006)