From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Group-oriented authentication mechanism with key exchange., и . Comput. Commun., 21 (5): 485-497 (1998)Improvement of modified authenticated key agreement protocol., , , и . Appl. Math. Comput., 142 (2-3): 305-308 (2003)A three-level authenticated conference key establishment protocol for UMTS networks., , и . Journal of Zhejiang University - Science C, 12 (5): 371-378 (2011)ID-Based Structured Mulitsignature Schemes., , и . Network Security, том 206 из IFIP Conference Proceedings, стр. 45-59. Kluwer, (2001)An identity-based ring signature scheme from bilinear pairings., и . IACR Cryptology ePrint Archive, (2003)Retrieving similar pictures from iconic databases using G-tree., и . Pattern Recognit. Lett., 18 (6): 595-603 (1997)Novel Anonymous Authentication Scheme Using Smart Cards., , и . IEEE Trans. Ind. Informatics, 9 (4): 2004-2013 (2013)Secure anonymous authentication scheme without verification table for mobile satellite communication systems., , и . Int. J. Satell. Commun. Netw., 32 (5): 443-452 (2014)An Improved One-Time Digital Signature Scheme Based on One-Way Function., и . J. Inf. Sci. Eng., 12 (3): 387-395 (1996)New Secure Broadcasting Scheme Realizing Information Granularity., , , и . J. Inf. Sci. Eng., 26 (4): 1509-1523 (2010)