From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Provable Security of KASUMI and 3GPP Encryption Mode f8., , , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 255-271. Springer, (2001)CPA performance enhancement based on spectrogram., , , и . ICCST, стр. 195-200. IEEE, (2012)A Secure Handover Protocol Design in Wireless Networks with Formal Verification., , , и . WWIC, том 4517 из Lecture Notes in Computer Science, стр. 67-78. Springer, (2007)Known-IV Attacks on Triple Modes of Operation of Block Ciphers., , , , , , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 208-221. Springer, (2001)Fingerprint Template Protection Using Fuzzy Vault., , , , , и . ICCSA (3), том 4707 из Lecture Notes in Computer Science, стр. 1141-1151. Springer, (2007)Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments., , , , и . WISA, том 13720 из Lecture Notes in Computer Science, стр. 277-288. Springer, (2022)A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro., , , и . COMSWARE, IEEE, (2007)Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens., , , и . FGIT-FGCN/DCA, том 350 из Communications in Computer and Information Science, стр. 72-79. Springer, (2012)A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring., , , , , и . ACISP, том 1841 из Lecture Notes in Computer Science, стр. 41-48. Springer, (2000)On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP., и . FGIT-SecTech/DRBC, том 122 из Communications in Computer and Information Science, стр. 39-46. Springer, (2010)