From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , и . Sensors, 14 (7): 12937-12957 (2014)Digital Optoelectrical Pulse Method for Vernier-Type Rotary Encoders., , , и . IEEE Trans. Instrumentation and Measurement, 65 (2): 431-440 (2016)Secure Group Communications over Combined Wired/Wireless Networks., , , и . IACR Cryptology ePrint Archive, (2004)On the security of a password-only authenticated three-party key exchange protocol., , , и . IACR Cryptology ePrint Archive, (2013)Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data., , , и . J. Inf. Sci. Eng., 30 (3): 787-817 (2014)Fast Extraction of Maximal Frequent Subtrees Using Bits Representation., , , и . J. Inf. Sci. Eng., 25 (2): 435-464 (2009)Security weakness in a three-party pairing-based protocol for password authenticated key exchange., , , и . Inf. Sci., 177 (6): 1364-1375 (2007)An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 424-427 (2015)Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting., , , , и . Symmetry, 7 (1): 105-124 (2015)Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 213-218 (2006)