From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of Secure Watermarking Scheme for Watermarking Protocol., , , , и . PCM, том 4810 из Lecture Notes in Computer Science, стр. 357-366. Springer, (2007)A two-party privacy preserving set intersection protocol against malicious users in cloud computing., , , и . Comput. Stand. Interfaces, (2017)Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol., , , , и . Inf. Sci., 180 (23): 4672-4684 (2010)A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid., , , и . KSII Trans. Internet Inf. Syst., 15 (2): 617-636 (2021)Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks., , , , , , и . Int. J. Distributed Sens. Networks, (2018)Efficient Mobile IP Registration in Certificateless Signature., , и . AINA Workshops, стр. 363-366. IEEE Computer Society, (2010)IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks., , , и . Comput. Commun., 31 (4): 659-667 (2008)An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks., , , и . KSII Trans. Internet Inf. Syst., 9 (10): 4250-4267 (2015)A Certificateless Noninteractive Key Exchange Protocol with Provable Security., , , и . Secur. Commun. Networks, (2020)An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement., , , и . SpaCCS, том 10656 из Lecture Notes in Computer Science, стр. 56-69. Springer, (2017)