From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security., , и . Int. J. Netw. Secur., 21 (5): 774-784 (2019)Picture-word order compound protein interaction: Predicting compound-protein interaction using structural images of compounds., , , , , и . J. Comput. Chem., 43 (4): 255-264 (2022)An Efficient Data Auditing Protocol With a Novel Sampling Verification Algorithm., , и . IEEE Access, (2021)Lower Bounds on the Second Order nonlinearity of Boolean Functions., , и . Int. J. Found. Comput. Sci., 22 (6): 1331-1349 (2011)Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting., , , , и . IACR Cryptol. ePrint Arch., (2022)Linear Complexities of the Frequency Hopping Sequences in Two Optimal Sets., и . INCoS, стр. 108-114. IEEE Computer Society, (2011)Linear spans of optimal sets of frequency hopping sequences., , и . RAIRO Theor. Informatics Appl., 46 (3): 343-354 (2012)Deep2s: Improving Aspect Extraction in Opinion Mining With Deep Semantic Representation., , , , , , и . IEEE Access, (2020)Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)., , , и . J. Inf. Secur. Appl., (2019)Cover Image., , , , , и . J. Comput. Chem., 43 (4): i (2022)