From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Active User Authentication for Mobile Devices., , , и . WASA, том 7405 из Lecture Notes in Computer Science, стр. 540-548. Springer, (2012)A block-free TGDH key agreement protocol for secure group communications., и . Parallel and Distributed Computing and Networks, стр. 288-293. IASTED/ACTA Press, (2004)A New Approach to Weighted Multi-Secret Sharing., , , , , и . ICCCN, стр. 1-6. IEEE, (2011)KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks., , и . ICC, стр. 1260-1265. IEEE, (2007)A taxonomy and comparison of remote voting schemes., , и . ICCCN, стр. 1-8. IEEE, (2014)A New Scheme for Anonymous Secure Group Communication., , , , и . HICSS, стр. 1-9. IEEE Computer Society, (2011)An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy., , , , и . MSN, стр. 279-286. IEEE Computer Society, (2009)The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks., , и . ICC, стр. 2243-2248. IEEE, (2006)A taxonomy of privilege escalation attacks in Android applications., , , и . Int. J. Secur. Networks, 9 (1): 40-55 (2014)Biometrics-Based Authentication: A New Approach., , и . ICCCN, стр. 1-6. IEEE, (2011)