From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Signcryption in Hierarchical Identity Based Cryptosystem., , , и . IACR Cryptology ePrint Archive, (2004)Forward-secure multisignature and blind signature schemes., , , и . Appl. Math. Comput., 168 (2): 895-908 (2005)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , и 11 other автор(ы). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)A Secure Modified ID-Based Undeniable Signature Scheme., , , и . IACR Cryptol. ePrint Arch., (2003)UFLE: a user-friendly location-free encryption system for mobile users., , , и . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid., , , , и . IEEE Trans. Dependable Secur. Comput., 12 (1): 85-97 (2015)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , и . Quantum Inf. Process., 13 (6): 1425-1435 (2014)MLAS: multiple level authentication scheme for VANETs., , , и . AsiaCCS, стр. 471-475. ACM, (2011)Randomized Competitive Algorithms for Successful and Unsuccessful Search., и . Comput. J., 39 (5): 427-439 (1996)Unsuccessful Search in Self-Adjusting Data Structures., и . J. Algorithms, 15 (3): 447-481 (1993)