From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Public Key Encryption with Ranked Multi-keyword Search., и . INCoS, стр. 109-113. IEEE, (2013)A New ID-Based Deniable Ring Authentication with Constant-Size Signature., и . BMEI, стр. 1-4. IEEE, (2009)Updatable Hash Proof System and Its Applications., , , , , и . ESORICS (1), том 9326 из Lecture Notes in Computer Science, стр. 266-285. Springer, (2015)Representations of Evolutionary Electronics., , , и . ISICA, том 5370 из Lecture Notes in Computer Science, стр. 67-78. Springer, (2008)Public-Key Encryption With Keyword Search via Obfuscation., , , и . IEEE Access, (2019)Multi-objective deep reinforcement learning for emergency scheduling in a water distribution network., , , и . Memetic Comput., 14 (2): 211-223 (2022)Multi-Dimensional Data Publishing With Local Differential Privacy., , , , и . EDBT, стр. 183-194. OpenProceedings.org, (2023)Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks., , , , и . ICONIP (15), том 1969 из Communications in Computer and Information Science, стр. 152-164. Springer, (2023)Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application., , , и . Int. J. High Perform. Comput. Netw., 10 (3): 226-239 (2017)Secure and Efficient Cloud Ciphertext Deduplication Based on SGX., , , , и . ICPADS, стр. 696-703. IEEE, (2022)