From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study of user data integrity during acquisition of Android devices., , , , , и . Digit. Investig., 10 (Supplement): S3-S11 (2013)Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme., , , и . IACR Cryptology ePrint Archive, (2011)A secure user-friendly authentication scheme with anonymity for wireless communications., , и . ICUIMC, стр. 110. ACM, (2013)Enhancement of two-factor authenticated key exchange protocols in public wireless LANs., , и . Comput. Electr. Eng., 36 (1): 213-223 (2010)A 192-Gb 12-High 896-GB/s HBM3 DRAM with a TSV Auto-Calibration Scheme and Machine-Learning-Based Layout Optimization., , , , , , , , , и 39 other автор(ы). ISSCC, стр. 444-446. IEEE, (2022)An improved key establishment scheme for wireless sensor network., , и . CFI, стр. 70-71. ACM, (2011)An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack., , , , и . ATC, том 4610 из Lecture Notes in Computer Science, стр. 135-145. Springer, (2007)How to Trust DRE Voting Machines Preserving Voter Privacy., , и . ICEBE, стр. 302-307. IEEE Computer Society, (2008)Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol., , , , и . NCM, стр. 618-621. IEEE Computer Society, (2009)A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks, и . CoRR, (2009)