From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain., , , , и . IEEE Trans. Veh. Technol., 69 (6): 5784-5798 (2020)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , и . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing., , , , и . Future Gener. Comput. Syst., (2018)Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain., , , , , , и . Secur. Commun. Networks, (2022)Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation., , , , , и . IEEE Trans. Serv. Comput., 16 (6): 3999-4011 (ноября 2023)Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks., , , , и . IEEE Trans. Serv. Comput., 16 (3): 2114-2125 (мая 2023)Efficient and Identity-based Signcryption with Provably-secure., , и . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., и . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)A fair data access control towards rational users in cloud storage., , , , и . Inf. Sci., (2017)APPLET: a privacy-preserving framework for location-aware recommender system., , , , , , и . Sci. China Inf. Sci., 60 (9): 92101 (2017)