From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems., , , , и . Security and Management, стр. 547-553. CSREA Press, (2009)Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme., , , и . IACR Cryptology ePrint Archive, (2011)A secure user-friendly authentication scheme with anonymity for wireless communications., , и . ICUIMC, стр. 110. ACM, (2013)EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data., , , и . IDEAL, том 3578 из Lecture Notes in Computer Science, стр. 1-8. Springer, (2005)A Practical Analysis of Smartphone Security., , , и . HCI (11), том 6771 из Lecture Notes in Computer Science, стр. 311-320. Springer, (2011)Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards., , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 377-385. Springer, (2010)USN Middleware Access Control of Sensor Network and Selective Encryption of Information., , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 343-352. Springer, (2011)Security Analysis on Digital Signature Function Implemented in PDF Software., , , , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 327-334. Springer, (2011)Cryptanalysis of the User Authentication Scheme with Anonymity., , , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 285-292. Springer, (2011)Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks., , , , и . ICCSA (2), том 10961 из Lecture Notes in Computer Science, стр. 50-61. Springer, (2018)