From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes., , , , , , и . J. Networks, 5 (6): 634-641 (2010)A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree., , , и . J. Softw., 4 (1): 73-80 (2009)New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems., , , и . TAMC, том 4484 из Lecture Notes in Computer Science, стр. 189-198. Springer, (2007)Modeling and Deploying Networklet., , , , , , и . GLOBECOM, стр. 1-6. IEEE, (2017)Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method., , , , и . CSE/EUC (1), стр. 866-869. IEEE Computer Society, (2017)Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase., , , и . 3PGCIC, стр. 840-843. IEEE Computer Society, (2015)A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage., , , и . WAIM, стр. 471-472. IEEE Computer Society, (2008)Networklet: Concept and Deployment., , , , , , и . ICDCS, стр. 2624-2625. IEEE Computer Society, (2017)Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things., , и . IEEE Internet Things J., 9 (14): 12711-12722 (2022)DTRE: A model for predicting drug-target interactions of endometrial cancer based on heterogeneous graph., , , и . Future Gener. Comput. Syst., (2024)