From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting Electronic Signatures in Case of Key Leakage., , , , , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 252-274. Springer, (2016)t-Out-of-n String/Bit Oblivious Transfers Revisited., , , , и . ISPEC, том 3439 из Lecture Notes in Computer Science, стр. 410-421. Springer, (2005)Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage., , , и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 445-458. Springer, (2018)HVDB: a hierarchical verifiable database scheme with scalable updates., , , , и . J. Ambient Intell. Humaniz. Comput., 10 (8): 3045-3057 (2019)Security Analysis of a Suite of Deniable Authentication Protocols., , , и . Int. J. Netw. Secur., 15 (5): 384-389 (2013)Toward Forward Secure SSE Supporting Conjunctive Keyword Search., , , , и . IEEE Access, (2019)The Design and Implementation of Online Identification of CAPTCHA Based on the Knowledge Base., , , , и . CCTA (2), том 479 из IFIP Advances in Information and Communication Technology, стр. 92-99. (2015)Quantum Ant Colony Algorithm Based on Bloch Coordinates., , и . ICICA (LNCS), том 7473 из Lecture Notes in Computer Science, стр. 405-412. Springer, (2012)Global stability of complex-valued neural networks with both leakage time delay and discrete time delay on time scales., и . Neurocomputing, (2013)Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption., , , , и . ESORICS (2), том 11736 из Lecture Notes in Computer Science, стр. 304-321. Springer, (2019)