From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

General secret sharing scheme., и . Comput. Commun., 22 (8): 755-757 (1999)Indexing on Spherical Surfaces Using Semi-Quadcodes., и . SSD, том 692 из Lecture Notes in Computer Science, стр. 510-529. Springer, (1993)Security Protocol Analysis with Improved Authentication Tests., , , и . ISPEC, том 3903 из Lecture Notes in Computer Science, стр. 123-133. Springer, (2006)A conference key distribution scheme based on the theory of quadratic residues., и . Comput. Commun., 22 (8): 735-738 (1999)A Robust Framework For Eigenspace Image Reconstruction., , и . WACV/MOTION, стр. 54-59. IEEE Computer Society, (2005)Cheater identification in (t, n) threshold scheme., , и . Comput. Commun., 22 (8): 762-765 (1999)A Routing Protocol for Anycast Messages., , , и . IEEE Trans. Parallel Distributed Syst., 11 (6): 571-588 (2000)Region Tracking via HMMF in Joint Feature-Spatial Space., , и . WACV/MOTION, стр. 72-77. IEEE Computer Society, (2005)Remote password authentication scheme based on cross-product., и . Comput. Commun., 22 (4): 390-393 (1999)MSpectraAI: a powerful platform for deciphering proteome profiling of multi-tumor mass spectrometry data by using deep neural networks., , , , и . BMC Bioinform., 21 (1): 439 (2020)