From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding., , , и . Future Gener. Comput. Syst., (2019)General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications., и . J. Softw., 9 (10): 2557-2563 (2014)On the key dependent message security of DHIES., , , , и . ICAIT, стр. 322-328. IEEE, (2017)Certificateless Dynamic Data Sharing Scheme With File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment., и . IEEE Internet Things J., 11 (6): 9630-9644 (марта 2024)A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding., и . J. Commun., 10 (1): 43-47 (2015)Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (3): 898-905 (2015)Identity-based proof of retrievability meets with identity-based network coding., и . Clust. Comput., 25 (5): 3067-3083 (2022)Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions., и . Secur. Commun. Networks, 8 (8): 1525-1536 (2015)KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited., и . SECRYPT, стр. 299-306. SciTePress, (2014)Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage., и . Comput. Networks, (2022)