From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme., , , , и . IACR Cryptology ePrint Archive, (2008)On the Provable Security of Multi-Receiver Signcryption Schemes., , , , и . IACR Cryptology ePrint Archive, (2008)Impact of information in a simple multiagent collaborative task., , , и . CDC, стр. 4543-4548. IEEE, (2015)Portfolio Allocation for Sellers in Online Advertising., , , и . CoRR, (2015)Demand Prediction and Placement Optimization for Electric Vehicle Charging Stations., , , , , и . IJCAI, стр. 3117-3123. IJCAI/AAAI Press, (2016)Managing Overstaying Electric Vehicles in Park-and-Charge Facilities., , и . IJCAI, стр. 2465-2471. IJCAI/AAAI Press, (2016)Dispatching to incentivize fast service in multi-server queues., , и . SIGMETRICS Perform. Evaluation Rev., 39 (3): 43-45 (2011)Potential games are necessary to ensure pure nash equilibria in cost sharing games., , и . EC, стр. 563-564. ACM, (2013)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , и . IACR Cryptology ePrint Archive, (2008)Stable utility design for distributed resource allocation., , и . CDC, стр. 1161-1166. IEEE, (2014)