From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lattice Based Identity Based Proxy Re-Encryption Scheme., , и . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)Guest Editorial: Special Issue on Cyber Security Protections and Applications., , и . J. Internet Serv. Inf. Secur., 4 (2): 1-3 (2014)Edge-disjoint paths in permutation graphs., и . Discussiones Mathematicae Graph Theory, 15 (1): 59-72 (1995)Modeling and simulation of dynamic job scheduling in multiprocessor systems., , , и . Int. J. Comput. Math., 58 (3-4): 221-247 (1995)Identity Based Online/Offline Encryption and Signcryption Schemes Revisited., , и . InfoSecHiComNet, том 7011 из Lecture Notes in Computer Science, стр. 111-127. Springer, (2011)A New Linear Algorithm for the Two Path Problem on Chordal Graphs., , и . FSTTCS, том 338 из Lecture Notes in Computer Science, стр. 49-66. Springer, (1988)Reoptimization of Path Vertex Cover Problem., , и . CoRR, (2019)Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts., , и . IACR Cryptology ePrint Archive, (2019)Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation., , и . J. Cryptol., 28 (1): 49-109 (2015)Privacy Preserving DBSCAN Algorithm for Clustering., и . ADMA, том 4632 из Lecture Notes in Computer Science, стр. 57-68. Springer, (2007)