From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement., , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 588-604. Springer, (2018)An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (10): 1891-1894 (2016)Response to the discussion of "The effect of parameter uncertainty on achieved safety integrity of safety system"., , и . Reliab. Eng. Syst. Saf., (2013)The effect of parameter uncertainty on achieved safety integrity of safety system., , и . Reliab. Eng. Syst. Saf., (2012)A Novel Grey Wolf Optimizer Algorithm With Refraction Learning., , , , , и . IEEE Access, (2019)A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 221-224 (2020)Robust Frequency Domain Spline Adaptive Filtering Based on the Half-Quadratic Criterion: Performance Analysis and Applications., , , и . IEEE Trans. Instrum. Meas., (2023)SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs., , , , , и . IEEE/ACM Trans. Netw., 31 (4): 1463-1477 (августа 2023)Leveraging SDN and OpenFlow to Mitigate Interference in Enterprise WLAN., , и . J. Networks, 9 (6): 1526-1533 (2014)Model checking QCTL plus on quantum Markov chains., , , и . Theor. Comput. Sci., (2022)