From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE., , , , , и . ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 147-168. Springer, (2021)Fusion: Efficient and Secure Inference Resilient to Malicious Servers., , , , , , , и . NDSS, The Internet Society, (2023)Efficient and Fully Secure Lattice-Based IBE with Equality Test., , , , , , и . ICICS (2), том 12919 из Lecture Notes in Computer Science, стр. 301-318. Springer, (2021)Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers., , , , и . Int. J. Bifurc. Chaos, 27 (10): 1750155:1-1750155:13 (2017)RFID and Contactless Technology., и . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (4): 1785-1800 (июля 2024)Energy-Efficient Distance-Bounding with Residual Charge Computation., , , , и . IEEE Trans. Emerg. Top. Comput., 8 (2): 365-376 (2020)Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead., , , , , и . ASIACRYPT (1), том 14438 из Lecture Notes in Computer Science, стр. 272-301. Springer, (2023)A New Unpredictability-Based RFID Privacy Model., , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 479-492. Springer, (2013)PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace., , , , , , и . IEEE Internet Things J., 11 (8): 13424-13436 (апреля 2024)