From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , и . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords., , , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 31-43. Springer, (2007)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , и . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Performance analysis of two bridged CSMA/CD networks., , , , и . Comput. Commun., 16 (8): 501-510 (1993)Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Fortifying password authentication in integrated healthcare delivery systems., , и . AsiaCCS, стр. 255-265. ACM, (2006)Design and Implementation of a Secure Prototype for EPCglobal Network Services., , , и . RFIDSec Asia, том 8 из Cryptology and Information Security Series, стр. 45-56. IOS Press, (2012)Unforgeability of an improved certificateless signature scheme in the standard model., , , , и . IET Inf. Secur., 8 (5): 273-276 (2014)DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services., , , , , , и . IEEE Trans. Mob. Comput., 22 (6): 3287-3302 (июня 2023)