From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing., , и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 189-199. Springer, (2010)Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data., , , и . Privacy in Statistical Databases, том 6344 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2010)Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication., , , и . IACR Cryptol. ePrint Arch., (2013)A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises., , и . SEC, том 181 из IFIP, стр. 95-112. Springer, (2005)Human-Driven Edge Computing and Communication: Part 1., , , , , и . IEEE Commun. Mag., 55 (11): 70-71 (2017)Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity., , , , , и . ACNS, том 3089 из Lecture Notes in Computer Science, стр. 369-382. Springer, (2004)Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems., и . ISPEC, том 4464 из Lecture Notes in Computer Science, стр. 284-300. Springer, (2007)Private Query on Encrypted Data in Multi-user Settings., , , и . ISPEC, том 4991 из Lecture Notes in Computer Science, стр. 71-85. Springer, (2008)Forensic-by-Design Framework for Cyber-Physical Cloud Systems., , , и . IEEE Cloud Comput., 3 (1): 50-59 (2016)Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security., , , , и . ISC, том 5735 из Lecture Notes in Computer Science, стр. 151-166. Springer, (2009)