From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Algorithms for Secure Outsourcing of Modular Exponentiations., , , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 541-556. Springer, (2012)Continuous Authentication for the Internet of Things Using Channel State Information., , и . GLOBECOM, стр. 1-6. IEEE, (2019)Publicly verifiable database scheme with efficient keyword search., , , и . Inf. Sci., (2019)Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation., , , , , и . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (ноября 2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , и . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (мая 2023)A fair data access control towards rational users in cloud storage., , , , и . Inf. Sci., (2017)TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , и . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)Efficient and Identity-based Signcryption with Provably-secure., , и . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., и . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET., , , , , и . IEEE Trans. Intell. Transp. Syst., 24 (11): 13108-13122 (ноября 2023)