From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An improved dynamic provable data possession model., , и . CCIS, стр. 290-295. IEEE, (2011)An Empirical Study of SDK Credential Misuse in iOS Apps., , , и . APSEC, стр. 258-267. IEEE, (2018)Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network., , , , и . ISNN (1), том 5551 из Lecture Notes in Computer Science, стр. 60-67. Springer, (2009)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections., , , , и . IEEE Trans. Mob. Comput., 23 (4): 3309-3327 (апреля 2024)New algorithms for verifiable outsourcing of bilinear pairings., , , , и . Sci. China Inf. Sci., 59 (9): 99103 (2016)The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions., , и . Electron. Colloquium Comput. Complex., (2014)Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks., , , , , , , , и . KSII Trans. Internet Inf. Syst., 12 (7): 3421-3437 (2018)Architecture Support for Memory Confidentiality and Integrity in Embedded Systems., , , , и . Int. J. Distributed Sens. Networks, 5 (1): 96 (2009)Evaluation and Improvement of Generic-Emulating DPA Attacks., , , , , , , и . IACR Cryptol. ePrint Arch., (2016)Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing., , , и . IACR Cryptol. ePrint Arch., (2022)