From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Design of the Hash Functions With All-or-Nothing Property., и . J. Inf. Sci. Eng., 17 (6): 945-957 (2001)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , и . CSA/CUTE, том 373 из Lecture Notes in Electrical Engineering, стр. 437-443. Springer, (2015)DRM Cloud Architecture and Service Scenario for Content Protection., , и . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , и . MUE/FutureTech, том 518 из Lecture Notes in Electrical Engineering, стр. 353-358. Springer, (2018)Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage., , , и . Wirel. Commun. Mob. Comput., (2019)All-or-Nothing Transform and Remotely Keyed Encription Protocols., , и . Public Key Cryptography, том 1751 из Lecture Notes in Computer Science, стр. 178-195. Springer, (2000)An Image Steganography Using Pixel Characteristics., , , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 581-588. Springer, (2005)Intelligent Access Control Mechanism for Ubiquitous Applications., и . ACIS-ICIS, стр. 955-960. IEEE Computer Society, (2007)A Simplified Approach to User Controllable Threshold Signatures., , и . CEC, стр. 273-280. IEEE Computer Society, (2004)Design and implementation of E-discovery as a service based on cloud computing., , , и . Comput. Sci. Inf. Syst., 10 (2): 703-724 (2013)