From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity-Based Encryption from e-th Power Residue Symbols., , , , и . IACR Cryptology ePrint Archive, (2019)A Blockchain-Based Privacy-Preserving Scheme for Smart Grids., , , и . ICBCT, стр. 120-124. ACM, (2020)Fault-aware flow control and multi-path routing in VANETs., , , , и . Peer-to-Peer Netw. Appl., 8 (6): 1090-1107 (2015)LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search., , , и . Inf. Sci., (ноября 2023)White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively., , , и . IEEE Trans. Dependable Secur. Comput., 15 (5): 883-897 (2018)A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing., , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (3): 1941-1958 (мая 2023)Secure and Efficient Attribute-Based Encryption with Keyword Search., , , и . Comput. J., 61 (8): 1133-1142 (2018)All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application., , , , и . Comput. J., 62 (8): 1148-1157 (2019)VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication., , , , , и . SSIC, стр. 1-8. IEEE, (2018)Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid., , , , и . IEEE Syst. J., 8 (2): 598-607 (2014)