From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Foreword: Computational Intelligence for Network Control and Security., и . Int. J. Comput. Intell. Syst., 5 (5): 805-807 (2012)A Special Proxy Signature Scheme with Multi-warrant., , , и . ASIAN, том 5913 из Lecture Notes in Computer Science, стр. 147-157. Springer, (2009)An anonymous authentication scheme for mobile communication., , , и . WCNIS, стр. 359-364. IEEE, (2010)An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme., , , , , и . ISA, том 5576 из Lecture Notes in Computer Science, стр. 588-597. Springer, (2009)Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle., , и . ISNN (3), том 5553 из Lecture Notes in Computer Science, стр. 318-327. Springer, (2009)Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications., , , и . IEEE Trans. Multim., 22 (1): 82-95 (2020)Counterexample of truncated Costas optical orthogonal codes., , и . IEEE Trans. Commun., 45 (6): 640-643 (1997)Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model., , , и . KSII Trans. Internet Inf. Syst., 10 (5): 2427-2445 (2016)A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure., , , , и . KSII Trans. Internet Inf. Syst., 8 (12): 4552-4567 (2014)Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks., , , и . KSII Trans. Internet Inf. Syst., 10 (3): 1273-1288 (2016)