From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case., и . IEEE Access, (2020)Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system., , , и . Secur. Commun. Networks, 9 (16): 3309-3313 (2016)Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage., и . Comput. Networks, (2022)On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (11): 2267-2271 (2014)RKA Security for Identity-Based Signature Scheme., , , , и . IEEE Access, (2020)Comment on Ä Tag Encoding Scheme Against Pollution Attack to Linear Network Coding"., , , и . IEEE Trans. Parallel Distributed Syst., 31 (11): 2618-2619 (2020)Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (2): 762-766 (2015)On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (12): 2477-2480 (2018)Identity-based remote data checking with a designated verifier., , , , и . J. Cloud Comput., (2022)Secure network coding from secure proof of retrievability., , , , и . Sci. China Inf. Sci., (2021)