From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secrecy gain of Gaussian wiretap codes from unimodular lattices., и . ITW, стр. 718-722. IEEE, (2011)Discriminative Analysis of Neuromyelitis Optica Using Twodimensional Histogram from Diffusion Tensor Imaging., , , , , и . ISBI, стр. 752-755. IEEE, (2007)Post-Quantum Cheating Detectable Private Information Retrieval., , , и . SEC, том 648 из IFIP Advances in Information and Communication Technology, стр. 431-448. Springer, (2022)A Virtual Wiretap Channel for Secure Message Transmission., , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 171-192. Springer, (2016)Secrecy gain of Gaussian wiretap codes from 2- and 3-modular lattices., и . ISIT, стр. 1747-1751. IEEE, (2012)Non-malleable Coding for Arbitrary Varying Channels., , , и . ITW, стр. 1-5. IEEE, (2019)Progressive atrophy in the optic pathway and visual cortex of early blind Chinese adults: A voxel-based morphometry magnetic resonance imaging study., , , , , и . NeuroImage, 37 (1): 212-220 (2007)Parcellating the Intra-splenium Based on the Traced Fiber from Tractography., , , и . CVBIA, том 3765 из Lecture Notes in Computer Science, стр. 544-550. Springer, (2005)Threshold Changeable Ramp Secret Sharing., , , и . CANS, том 11829 из Lecture Notes in Computer Science, стр. 308-327. Springer, (2019)Detecting Algebraic Manipulation in Leaky Storage Systems., , и . ICITS, том 10015 из Lecture Notes in Computer Science, стр. 129-150. (2016)