From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Policy-based encryption schemes from bilinear pairings., , и . AsiaCCS, стр. 368. ACM, (2006)Security in Open Networks and Distributed Systems., и . Comput. Networks ISDN Syst., 22 (5): 232-346 (1991)Identity Based Message Authentication for Dynamic Networks., и . SEC, том 201 из IFIP, стр. 50-61. Springer, (2006)Enabling adaptive and secure extranets., , , и . Communications and Multimedia Security, том 228 из IFIP Conference Proceedings, стр. 123-135. Kluwer, (2002)Information Confinement, Privacy, and Security in RFID Systems., и . ESORICS, том 4734 из Lecture Notes in Computer Science, стр. 187-202. Springer, (2007)Policy-Based Cryptography and Applications., и . Financial Cryptography, том 3570 из Lecture Notes in Computer Science, стр. 72-87. Springer, (2005)Multi-resolution access control algorithm based on fractal coding., , и . ICIP (3), стр. 235-238. IEEE Computer Society, (1996)Establishment of Ad-Hoc Communities through Policy-Based Cryptography., , , и . WCAN@ICALP, том 171 из Electronic Notes in Theoretical Computer Science, стр. 107-120. Elsevier, (2006)Analysis of Privacy in Online Social Networks from the Graph Theory Perspective., , и . GLOBECOM, стр. 1-5. IEEE, (2011)Towards Transactional PervasiveWorkflows., и . EDOC, стр. 141-152. IEEE Computer Society, (2006)