From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Minimal logarithmic signatures for the unitary group Un(q)., , и . Des. Codes Cryptogr., 77 (1): 179-191 (2015)Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks., , , , и . IJDSN, (2013)An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems., , , и . INCoS, стр. 199-202. IEEE, (2016)On Efficient Constructions of Lightweight MDS Matrices., , и . IACR Trans. Symmetric Cryptol., 2018 (1): 180-200 (2018)Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing., , , , и . J. Parallel Distributed Comput., (2019)AntNest: Fully Non-Interactive Secure Multi-Party Computation., , , и . IEEE Access, (2018)New designing of cryptosystems based on quadratic fields., , и . Sci. China Ser. F Inf. Sci., 51 (8): 1106-1116 (2008)Event-Based Variance-Constrained $H_$ Filtering for Stochastic Parameter Systems Over Sensor Networks With Successive Missing Measurements., , , и . IEEE Trans. Cybern., 48 (3): 1007-1017 (2018)Discrete logarithm based additively homomorphic encryption and secure data aggregation., , , , и . Inf. Sci., 181 (16): 3308-3322 (2011)Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV., , , , , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 287-301. Springer, (2019)