From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bidirectional Mobile Offloading in LTE-U and WiFi Coexistence Systems., , , и . VTC Fall, стр. 1-6. IEEE, (2018)Efficient Federated Learning using Random Pruning in Resource-Constrained Edge Intelligence Networks., , , , , и . GLOBECOM, стр. 5244-5249. IEEE, (2023)Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications., , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 664-673. Springer, (2020)EKE Meets Tight Security in the Universally Composable Framework., , , и . Public Key Cryptography (1), том 13940 из Lecture Notes in Computer Science, стр. 685-713. Springer, (2023)Authenticated Key Exchange and Signatures with Tight Security in the Standard Model., , , , , , и . CRYPTO (4), том 12828 из Lecture Notes in Computer Science, стр. 670-700. Springer, (2021)Multi-hop Fine-Grained Proxy Re-encryption., , и . Public Key Cryptography (4), том 14604 из Lecture Notes in Computer Science, стр. 161-192. Springer, (2024)Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain., и . Public Key Cryptography (3), том 14603 из Lecture Notes in Computer Science, стр. 288-320. Springer, (2024)Prediction and Clustering of User Relationship in Social Network., , , , и . UIC/ATC/ScalCom, стр. 1155-1162. IEEE Computer Society, (2015)Efficient Leakage-Resilient Identity-Based Encryption with CCA Security., , и . Pairing, том 8365 из Lecture Notes in Computer Science, стр. 149-167. Springer, (2013)Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing., и . Public Key Cryptography, том 8383 из Lecture Notes in Computer Science, стр. 19-36. Springer, (2014)