From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Resilient Lkh: Secure Multicast Key Distribution Schemes., , и . Int. J. Found. Comput. Sci., 17 (5): 1205-1222 (2006)Transferable E-Cash Revisit., , и . SEC, том 181 из IFIP, стр. 171-188. Springer, (2005)Custodian-Hiding Verifiable Encryption., , и . WISA, том 3325 из Lecture Notes in Computer Science, стр. 51-64. Springer, (2004)On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST., , , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 34-46. Springer, (2003)Certificateless Public-Key Signature: Security Model and Efficient Construction., , , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 293-308. (2006)Certificateless signature: a new security model and an improved generic construction., , , и . Des. Codes Cryptogr., 42 (2): 109-126 (2007)Energy-Efficient Distance-Bounding with Residual Charge Computation., , , , и . IEEE Trans. Emerg. Top. Comput., 8 (2): 365-376 (2020)TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks., , и . WCNC, стр. 1-6. IEEE, (2010)Secure Outsourced Attribute-Based Signatures., , , , , и . IACR Cryptology ePrint Archive, (2012)Designing cloud-based electronic health record system with attribute-based encryption., , , , , и . Multim. Tools Appl., 74 (10): 3441-3458 (2015)