From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Active Attack on Protocols for Server-Aided RSA Signature Computation.. Inf. Process. Lett., 65 (2): 71-73 (1998)Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification., , , и . J. Inf. Hiding Multim. Signal Process., (2015)Protecting the Privacy of Users in e-Commerce Environment., и . CCCT (1), стр. 63-67. The International Institute of Informatics and Systemics (IIIS), (2004)Extended Relation Metadata for SCORM-based Learning Content Management Systems., , , и . J. Educ. Technol. Soc., 13 (1): 220-235 (2010)Accelerating DSA Signature Generation.. Cryptologia, 39 (2): 121-125 (2015)Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks., , , , и . AINA Workshops, стр. 502-507. IEEE Computer Society, (2012)A high payload data embedding scheme using dual stego-images with reversibility., , , , и . ICICS, стр. 1-5. IEEE, (2013)Comment on "Cheating Prevention in Visual Cryptography"., , и . IEEE Trans. Image Processing, 21 (7): 3319-3323 (2012)Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem., , и . IEICE Trans. Commun., 88-B (5): 2171-2172 (2005)Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding Algorithm., , и . IIH-MSP, стр. 1141-1145. IEEE Computer Society, (2008)