From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing., , , , , и . IEEE Internet Things J., 11 (2): 1893-1909 (января 2024)Broadcast based on layered diffusion in wireless ad hoc and sensor networks., , и . Wirel. Commun. Mob. Comput., 12 (1): 99-115 (2012)CGMOS: Certainty Guided Minority OverSampling., , , , и . CIKM, стр. 1623-1631. ACM, (2016)A Physical and SPICE-Compatible Model for the MOS Depletion Device.. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 4 (3): 349-356 (1985)A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks., , , , и . IEEE Access, (2020)Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols., , , , , и . Peer-to-Peer Netw. Appl., 15 (1): 304-323 (2022)Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing., , , и . IEEE Trans. Dependable Secur. Comput., 10 (2): 57-69 (2013)A novel approach toward source-to-sink distance estimation in wireless sensor networks., , , и . IEEE Commun. Lett., 14 (5): 384-386 (2010)Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext., , , и . AsiaCCS, стр. 191-202. ACM, (2015)Lecture video indexing using boosted margin maximizing neural networks., , , и . CoRR, (2017)