From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of a certificateless identification scheme., , , и . Secur. Commun. Networks, 8 (2): 122-125 (2015)SearchaStore: fast and secure searchable cloud services., , , и . Clust. Comput., 21 (2): 1189-1202 (2018)Intrinsic two-dimensional local structures for micro-expression recognition., , , , и . ICASSP, стр. 1851-1855. IEEE, (2016)Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09., , , и . CANS, том 7092 из Lecture Notes in Computer Science, стр. 172-184. Springer, (2011)Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents., , , и . Wireless Personal Communications, 56 (1): 73-83 (2011)High speed implementation of symmetric block cipher on GPU., , , и . ISPACS, стр. 102-107. IEEE, (2014)Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis., и . CARDIS, том 3928 из Lecture Notes in Computer Science, стр. 135-150. Springer, (2006)Energy-Efficient Cryptographic Engineering Paradigm., и . iNetSeC, том 7039 из Lecture Notes in Computer Science, стр. 78-88. Springer, (2011)On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences., , и . WISA, том 4867 из Lecture Notes in Computer Science, стр. 245-265. Springer, (2007)On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR., , и . PSIVT (1), том 7087 из Lecture Notes in Computer Science, стр. 257-266. Springer, (2011)