From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptively Secure Threshold Signature Scheme in the Standard Model., , и . Informatica, 20 (4): 591-612 (2009)Design methodology for the IBM POWER7 microprocessor., , , , , , , , , и 15 other автор(ы). IBM J. Res. Dev., 55 (3): 9 (2011)PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain., , и . IEEE Trans. Knowl. Data Eng., 35 (4): 4124-4136 (апреля 2023)Robust password changing and DoS resilience for human-centric password authentication., , , , и . Secur. Commun. Networks, 7 (10): 1552-1559 (2014)Registered ABE via Predicate Encodings., , , и . ASIACRYPT (5), том 14442 из Lecture Notes in Computer Science, стр. 66-97. Springer, (2023)Radiometric quality assessment of GOES-16 ABI L1b images., , , , , , , и . Earth Observing Systems, том 10764 из SPIE Proceedings, стр. 107641T. SPIE, (2018)Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm., , , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 305-312. IEEE, (2020)Cryptanalysis of group signature scheme from ID-based signature scheme., , и . InfoSecu, стр. 115-118. ACM, (2004)Approximate Inference in Logical Credal Networks., , , , , , и . IJCAI, стр. 5694-5701. ijcai.org, (2023)An Optimal Blind Signature Padding with Message Recovery., и . IAS, стр. 673-676. IEEE Computer Society, (2009)