From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Non-interactive Zero-Knowledge Functional Proofs., , , , , , , и . ASIACRYPT (5), том 14442 из Lecture Notes in Computer Science, стр. 236-268. Springer, (2023)Unforgeable Watermarking Schemes with Public Extraction., , , , и . SCN, том 11035 из Lecture Notes in Computer Science, стр. 63-80. Springer, (2018)Fully Secure Cipertext-Policy Hiding CP-ABE., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 24-39. Springer, (2011)Simulation-based selective opening security for receivers under chosen-ciphertext attacks., , , , , и . Des. Codes Cryptogr., 87 (6): 1345-1371 (2019)Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption., , , , и . AsiaCCS, стр. 659-672. ACM, (2018)Multi-authority anonymous authentication with public accountability for incentive-based applications., , , , , и . Comput. Networks, (июля 2023)Verifiable Computation on Outsourced Encrypted Data., , , и . ESORICS (1), том 8712 из Lecture Notes in Computer Science, стр. 273-291. Springer, (2014)Practical Federated Learning for Samples with Different IDs., , , и . ProvSec, том 13600 из Lecture Notes in Computer Science, стр. 176-195. Springer, (2022)Adaptable Ciphertext-Policy Attribute-Based Encryption., , , и . Pairing, том 8365 из Lecture Notes in Computer Science, стр. 199-214. Springer, (2013)Revisiting Unpredictability-Based RFID Privacy Models., , и . ACNS, том 6123 из Lecture Notes in Computer Science, стр. 475-492. (2010)