From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Preserving DBSCAN Algorithm for Clustering., и . ADMA, том 4632 из Lecture Notes in Computer Science, стр. 57-68. Springer, (2007)Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 38-58. Springer, (2013)Distributed consensus in the presence of sectional faults., , , , и . PODC, стр. 202-210. ACM, (2003)On Provably Secure Code-Based Signature and Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2012)Certificateless KEM and Hybrid Signcryption Schemes Revisited., , и . IACR Cryptology ePrint Archive, (2009)Identity Based Online/Offline Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2010)Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks., , и . IACR Cryptology ePrint Archive, (2012)Weighted Irredundance of Interval Graphs., и . ISAAC, том 834 из Lecture Notes in Computer Science, стр. 567-574. Springer, (1994)RSA-TBOS signcryption with proxy re-encryption., и . Digital Rights Management Workshop, стр. 59-66. ACM, (2008)Efficient single round attribute-based authenticated key exchange protocol., , и . Int. J. Comput. Math. Comput. Syst. Theory, 6 (4): 313-336 (2021)