From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network., , , , и . UIC, том 5061 из Lecture Notes in Computer Science, стр. 338-351. Springer, (2008)Evaluating differentially private decision tree model over model inversion attack., , и . Int. J. Inf. Sec., 21 (3): 1-14 (2022)Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function., , и . IEICE Trans. Commun., 98-B (7): 1276-1283 (2015)Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product., , , и . IEEE Trans. Computers, 67 (12): 1794-1805 (2018)High speed search for large-scale digital forensic investigation., , и . e-Forensics, стр. 31. ICST/ACM, (2008)An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module., и . Security and Management, стр. 408-413. CSREA Press, (2004)Suspects' data hiding at remaining registry values of uninstalled programs., , и . e-Forensics, стр. 32. ICST/ACM, (2008)Comments on Ön the Polynomial Multiplication in Chebyshev Form"., , , и . IEEE Trans. Computers, 63 (12): 3162-3163 (2014)Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm., , , и . IEEE Access, (2019)A Concrete Security Analysis for 3GPP-MAC., , , и . FSE, том 2887 из Lecture Notes in Computer Science, стр. 154-169. Springer, (2003)