From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forgery Attacks on Chang et al.'s signature scheme with message recovery., , и . IACR Cryptology ePrint Archive, (2004)DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain., , , и . ICA3PP (3), том 11336 из Lecture Notes in Computer Science, стр. 385-401. Springer, (2018)A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing., , и . INCoS, стр. 503-506. IEEE, (2013)Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government., , , , и . FCS, том 1726 из Communications in Computer and Information Science, стр. 48-68. Springer, (2022)CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors., , , , , и . IEEE Trans. Cloud Comput., 9 (4): 1362-1375 (2021)Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors., , , и . IEEE Trans. Cloud Comput., 9 (3): 923-937 (2021)Efficient multi-receiver identity-based signcryption from lattice assumption., , и . Int. J. Electron. Secur. Digit. Forensics, 10 (1): 20-38 (2018)Formal Verification of Security Protocols: ProVerif and Extensions., , , , и . ICAIS (2), том 13339 из Lecture Notes in Computer Science, стр. 500-512. Springer, (2022)An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things., , и . Inscrypt (2), том 14527 из Lecture Notes in Computer Science, стр. 389-393. Springer, (2023)Blockchain-Based Secure Data Provenance for Cloud Storage., , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2018)