From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks., , , и . ESORICS (1), том 8712 из Lecture Notes in Computer Science, стр. 130-147. Springer, (2014)Acceleration of Composite Order Bilinear Pairing on Graphics Hardware., , , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 341-348. Springer, (2012)A practical real-time authentication system with Identity Tracking based on mouse dynamics., , , , и . INFOCOM Workshops, стр. 121-122. IEEE, (2014)Data Framing Attacks against Nonlinear State Estimation in Smart Grid., , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2015)Reconstructing One-Articulated Networks with Distance Matrices., , , и . J. Comput. Biol., 25 (3): 253-269 (2018)Exposing frame deletion by detecting abrupt changes in video streams., , , , , , и . Neurocomputing, (2016)Discovering Minimal Infrequent Structures from XML Documents., , , и . WISE, том 3306 из Lecture Notes in Computer Science, стр. 291-302. Springer, (2004)Exponent-inversion Signatures and IBE under Static Assumptions., , , и . IACR Cryptology ePrint Archive, (2014)eCX: a secure infrastructure for e-course delivery., , , и . Internet Res., 13 (2): 116-125 (2003)Filtering of false positive microRNA candidates by a clustering-based approach., , , и . BMC Bioinform., (2008)