From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation., и . Appl. Algebra Eng. Commun. Comput., 24 (3-4): 277-308 (2013)SecLEACH - On the security of clustered sensor networks., , , , , , и . Signal Process., 87 (12): 2882-2895 (2007)A custom instruction approach for hardware and software implementations of finite field arithmetic over F263 using Gaussian normal bases., , , и . FPT, стр. 5-12. IEEE, (2005)FORTUNA - A framework for the design and development of hardware-based secure systems., , и . J. Syst. Softw., 86 (8): 2063-2076 (2013)ACBuilder: A tool for hardware architecture security evaluation., , , , и . HOST, стр. 97-102. IEEE Computer Society, (2016)An Attack on a Protocol for Certified Delivery., и . ISC, том 2433 из Lecture Notes in Computer Science, стр. 428-436. Springer, (2002)Two Notes on the Security of Certificateless Signatures., и . ProvSec, том 4784 из Lecture Notes in Computer Science, стр. 85-102. Springer, (2007)TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks., , , , , , и . Comput. Commun., 34 (3): 485-493 (2011)Isogeny formulas for Jacobi intersection and twisted hessian curves., , и . Adv. Math. Commun., 14 (3): 507-523 (2020)On Device Identity Establishment and Verification., , и . EuroPKI, том 6391 из Lecture Notes in Computer Science, стр. 130-145. Springer, (2009)