From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved group key transfer protocols from the protocol of Harn et al.. Secur. Commun. Networks, 6 (12): 1471-1477 (2013)Extended Prony Analysis on Power System Oscillation Under a Near-Resonance Condition., , , , и . CoRR, (2020)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)An Identity-Based Data Aggregation Protocol for the Smart Grid.. IEEE Trans. Ind. Informatics, 13 (5): 2428-2435 (2017)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , и . IEEE Access, (2018)Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , и . IEEE Access, (2019)Fast multicast scheme with secure network coding in cloud data centers., , , , , и . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 319-335. Springer, (2015)Ship detection for Radarsat-2 ScanSAR data using DoG scale-space., , , , , и . IGARSS, стр. 1881-1884. IEEE, (2013)