From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Content-Centric Group User Authentication for Secure Social Networks., , , , и . IEEE Trans. Emerg. Top. Comput., 8 (3): 833-844 (2020)Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction., , и . IACR Cryptol. ePrint Arch., (2015)Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage., , и . IEEE Trans. Serv. Comput., 14 (1): 71-81 (2021)Certificate-Based Conditional Proxy Re-Encryption., , и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 299-310. Springer, (2014)A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model., и . Inf. Sci., (2016)Cross Modal Compression: Towards Human-comprehensible Semantic Compression., , , , и . CoRR, (2022)Hierarchical Trust Level Evaluation for Pervasive Social Networking., , , , и . IEEE Access, (2017)Cross Modal Compression: Towards Human-comprehensible Semantic Compression., , , , и . ACM Multimedia, стр. 4230-4238. ACM, (2021)Certificate-based signcryption with enhanced security features., , , и . Comput. Math. Appl., 64 (6): 1587-1601 (2012)An Efficient Certificate-Based Designated Verifier Signature Scheme., , , и . Comput. Informatics, 35 (5): 1210-1230 (2016)