From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A taxonomy and comparison of remote voting schemes., , и . ICCCN, стр. 1-8. IEEE, (2014)KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks., , и . ICC, стр. 1260-1265. IEEE, (2007)A New Approach to Weighted Multi-Secret Sharing., , , , , и . ICCCN, стр. 1-6. IEEE, (2011)Active User Authentication for Mobile Devices., , , и . WASA, том 7405 из Lecture Notes in Computer Science, стр. 540-548. Springer, (2012)A Two-Stage Deanonymization Attack against Anonymized Social Networks., , , и . IEEE Trans. Computers, 63 (2): 290-303 (2014)Survey of return-oriented programming defense mechanisms., , и . Secur. Commun. Networks, 9 (10): 1247-1265 (2016)A Hierarchical Modeling and Analysis for Grid Service Reliability., , и . IEEE Trans. Computers, 56 (5): 681-691 (2007)A block-free TGDH key agreement protocol for secure group communications., и . Parallel and Distributed Computing and Networks, стр. 288-293. IASTED/ACTA Press, (2004)An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy., , , , и . MSN, стр. 279-286. IEEE Computer Society, (2009)A New Scheme for Anonymous Secure Group Communication., , , , и . HICSS, стр. 1-9. IEEE Computer Society, (2011)