From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Outsourced Calculation on Floating Point Numbers., , , , и . IEEE Trans. Inf. Forensics Secur., 11 (11): 2513-2527 (2016)Secure access to outsourced data.. SCC@ASIACCS, стр. 1-2. ACM, (2013)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , и . ACM Conference on Computer and Communications Security, стр. 54-65. ACM, (2009)A type I hybrid ARQ system with adaptive code rates., и . IEEE Trans. Commun., 43 (2/3/4): 733-737 (1995)Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management., , и . Int. J. Inf. Sec., 17 (3): 347-363 (2018)Multiuser private queries over encrypted databases., , , и . Int. J. Appl. Cryptogr., 1 (4): 309-319 (2009)Zero-error watermarking on jpeg images by shuffling huffman tree nodes., и . VCIP, стр. 1-4. IEEE, (2011)Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , и . ICISS, том 6503 из Lecture Notes in Computer Science, стр. 246-260. Springer, (2010)Variations of Diffie-Hellman Problem., , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 301-312. Springer, (2003)Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data., , , , , , и . IEEE Internet Things J., 6 (6): 9841-9852 (2019)