From post

A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs.

, , , , и . IEEE Trans. Dependable Secur. Comput., 20 (1): 422-436 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive cosine transform coding using marginal analysis., и . Visual Information Processing, том 2488 из SPIE Proceedings, стр. 162-167. SPIE, (1995)A fast-adaptive Huffman coding algorithm., и . IEEE Trans. Commun., 41 (4): 535-538 (1993)Data compression for space applications.. University of Sussex, Falmer, East Sussex, UK, (1992)British Library, EThOS.Adaptive cosine transform coding for compression of Mars-96 ELISMA instrument data., и . Microprocess. Microsystems, 19 (5): 277-282 (1995)Functional variants at the 11q13 risk locus for breast cancer regulate cyclin D1 expression through long-range enhancers, , , , , , , , , и 201 other автор(ы). American journal of human genetics, 92 (4): 489–503 (2013)Learning a Semantic Space by Deep Network for Cross-media Retrieval., , , и . DMS, стр. 199-203. Knowledge Systems Institute, (2015)CELF++: optimizing the greedy algorithm for influence maximization in social networks., , и . WWW (Companion Volume), стр. 47-48. ACM, (2011)Accounting history: Chinese contributions and challenges, и . Accounting, Business & Financial History, 13 (1): 1--3 (2003)Reasoning with Latent Structure Refinement for Document-Level Relation Extraction., , , и . ACL, стр. 1546-1557. Association for Computational Linguistics, (2020)Spatio-Temporal Event Detection from Multiple Data Sources., , , , и . PAKDD (1), том 11439 из Lecture Notes in Computer Science, стр. 293-305. Springer, (2019)