From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices., , , , , и . ISC, том 8783 из Lecture Notes in Computer Science, стр. 555-567. Springer, (2014)Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks., и . ATC, том 5586 из Lecture Notes in Computer Science, стр. 164-178. Springer, (2009)Employing Smartwatch for Enhanced Password Authentication., , , , , и . WASA, том 10251 из Lecture Notes in Computer Science, стр. 691-703. Springer, (2017)Collision Attacks With Budget Constraints on Key Management Schemes for Secure Multimedia Multicast.. IEEE Trans. Multim., 11 (3): 556-561 (2009)Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation., и . UIC, том 6406 из Lecture Notes in Computer Science, стр. 252-266. Springer, (2010)Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes., , и . ACISP (2), том 9723 из Lecture Notes in Computer Science, стр. 446-453. Springer, (2016)General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach.. ICC, стр. 1620-1624. IEEE, (2008)Making a good thing better: enhancing password/PIN-based user authentication with smartwatch., , , , и . Cybersecur., 1 (1): 7 (2018)Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem.. NPC Workshops, стр. 11-17. IEEE Computer Society, (2008)A Cost-Efficient Secure Multimedia Proxy System.. IEEE Trans. Multim., 10 (6): 1214-1220 (2008)