From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and efficient lightweight RFID authentication protocol based on fast tag indexing., , , , и . Int. J. Commun. Syst., 27 (11): 3244-3254 (2014)Directed proxy signature with fast revocation proven secure in the standard model., , , , и . IET Inf. Secur., 11 (3): 168-176 (2017)Fair Electronic Cash Based on Double Signatur., , и . J. Comput. Sci. Technol., 17 (6): 830-835 (2002)Factors Affectting Customer's Behavior Intention., и . IPEC, стр. 108-112. ACM, (2021)Secure Double Auction Protocols with Full Privacy Protection., , и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 215-229. Springer, (2003)How to conduct a sealed bargain on the internet., , и . InfoSecu, стр. 130-135. ACM, (2004)Some Notes on Password Authenticated Key Exchange Based on RSA., , и . CIS (2), стр. 580-583. IEEE Computer Society, (2009)978-0-7695-3931-7.A Deep Copy Protection Framework for Electronic Devices within Home., , , , , и . IAS, стр. 23-26. IEEE Computer Society, (2009)Authentication of mobile users in personal communication system., и . PIMRC, стр. 1239-1242. (1996)A New Efficient Group Signature With Forward Security., , и . Informatica (Slovenia), 28 (2): 153-157 (2004)