From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Expressive CP-ABE with partially hidden access structures., , и . AsiaCCS, стр. 18-19. ACM, (2012)Fortifying password authentication in integrated healthcare delivery systems., , и . AsiaCCS, стр. 255-265. ACM, (2006)Trellis-coded multidimensional phase modulation., , , , и . IEEE Trans. Inf. Theory, 36 (1): 63-89 (1990)New Paradigm of Inference Control with Trusted Computing., , и . DBSec, том 4602 из Lecture Notes in Computer Science, стр. 243-258. Springer, (2007)Efficient revocable certificateless encryption against decryption key exposure., , , и . IET Inf. Secur., 9 (3): 158-166 (2015)Unforgeability of an improved certificateless signature scheme in the standard model., , , , и . IET Inf. Secur., 8 (5): 273-276 (2014)A new hardware-assisted PIR with O(n) shuffle cost., , , и . Int. J. Inf. Sec., 9 (4): 237-252 (2010)Special issue on security and privacy of blockchain technologies., , , , и . Int. J. Inf. Sec., 19 (3): 243-244 (2020)LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes., , , и . IEEE Trans. Ind. Informatics, 19 (6): 7676-7688 (июня 2023)Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT., , , , , , и . IEEE Internet Things J., 9 (13): 11017-11029 (2022)