From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed consensus in the presence of sectional faults., , , , и . PODC, стр. 202-210. ACM, (2003)Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 38-58. Springer, (2013)Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles., , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 359-376. Springer, (2010)Breaking and Building of Threshold Signcryption Schemes., , , и . Inscrypt, том 6151 из Lecture Notes in Computer Science, стр. 108-123. Springer, (2009)Identity-Based Deterministic Signature Scheme without Forking-Lemma., , и . IWSEC, том 7038 из Lecture Notes in Computer Science, стр. 79-95. Springer, (2011)Weighted Irredundance of Interval Graphs., и . ISAAC, том 834 из Lecture Notes in Computer Science, стр. 567-574. Springer, (1994)Modeling and simulation of dynamic job scheduling in multiprocessor systems., , , и . Int. J. Comput. Math., 58 (3-4): 221-247 (1995)Identity Based Online/Offline Encryption and Signcryption Schemes Revisited., , и . InfoSecHiComNet, том 7011 из Lecture Notes in Computer Science, стр. 111-127. Springer, (2011)A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme., , , и . ProvSec, том 11192 из Lecture Notes in Computer Science, стр. 111-128. Springer, (2018)Lattice Based Identity Based Proxy Re-Encryption Scheme., , и . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)