From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User k-anonymity for privacy preserving data mining of query logs., , , и . Inf. Process. Manag., 48 (3): 476-487 (2012)TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections., , , и . FPS, том 6888 из Lecture Notes in Computer Science, стр. 14-22. Springer, (2011)Secure and Scalable RFID Authentication Protocol., , и . DPM/SETOP, том 6514 из Lecture Notes in Computer Science, стр. 231-243. Springer, (2010)Dropout-Tolerant TTP-Free Mental Poker., , и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 30-40. Springer, (2005)Key Management System for Private Car-Sharing Scenarios., , и . VTC Fall, стр. 1-7. IEEE, (2018)Short-Term Linkable Group Signatures with Categorized Batch Verification., , , и . FPS, том 7743 из Lecture Notes in Computer Science, стр. 244-260. Springer, (2012)Protecting On-Line Casinos against Fraudulent Player Drop-Out., , , , , , и . ITCC (1), стр. 500-505. IEEE Computer Society, (2005)Secure and Anonymous Vehicle Access Control System to Traffic-Restricted Urban Areas., , , , и . ICCCN, стр. 1-7. IEEE, (2017)Improving Query Delay in Private Web Search., , и . 3PGCIC, стр. 200-206. IEEE Computer Society, (2011)A Secure E-Exam Management System., , и . ARES, стр. 864-871. IEEE Computer Society, (2006)