From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation., , , и . TSA, стр. 8-16. IEEE, (2016)一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation)., , , , и . 计算机科学, 44 (11): 22-26 (2017)Cecoin: A decentralized PKI mitigating MitM attacks., , , , , и . Future Gener. Comput. Syst., (2020)TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices., , , , и . IEEE Trans. Dependable Secur. Comput., 17 (1): 209-222 (2020)Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data., , , , , и . AsiaCCS, стр. 393-404. ACM, (2015)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 1165-1182. USENIX Association, (2020)Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement., , , , , и . Inscrypt, том 8567 из Lecture Notes in Computer Science, стр. 239-254. Springer, (2013)Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy., , , , и . ICICS, том 14252 из Lecture Notes in Computer Science, стр. 571-589. Springer, (2023)Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage., и . IEEE Access, (2019)A Scalable Cross-Chain Access Control and Identity Authentication Scheme., , , , , и . Sensors, 23 (4): 2000 (февраля 2023)