From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient certificateless authenticated key agreement protocol without bilinear pairings, и . CoRR, (2011)IoTChain: A Three-Tier Blockchain-based IoT Security Architecture., , , и . CoRR, (2018)Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol, , и . CoRR, (2010)New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems., , , и . J. High Speed Networks, 22 (2): 153-167 (2016)Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession., , , и . IEEE Trans. Serv. Comput., 12 (5): 824-835 (2019)Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks., , , , , и . Multim. Syst., 21 (1): 49-60 (2015)A pairing-free certificateless authenticated key agreement protocol., , и . Int. J. Commun. Syst., 25 (2): 221-230 (2012)An efficient and provably-secure certificateless signature scheme without bilinear pairings., , и . Int. J. Commun. Syst., 25 (11): 1432-1442 (2012)On the Security of a Key Agreement and Key Protection Scheme., , , и . IEEE Trans. Inf. Forensics Secur., (2020)Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud., , и . IEEE Trans. Inf. Forensics Secur., 11 (6): 1165-1176 (2016)