From post

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees.

, , , , , и . KES (1), том 4692 из Lecture Notes in Computer Science, стр. 672-679. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Processing Continuous Range Queries with Non-spatial Selections., , , и . MUSIC, том 274 из Lecture Notes in Electrical Engineering, стр. 31-38. Springer, (2013)Mining Information of Anonymous User on a Social Network Service., , , , , и . ASONAM, стр. 450-453. IEEE Computer Society, (2011)Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks., , и . NCM (1), стр. 335-340. IEEE Computer Society, (2008)A Data Sanitization Method for Privacy Preserving Data Re-publication., , , , и . NCM (2), стр. 28-31. IEEE Computer Society, (2008)978-0-7695-3322-3.An Efficient Top-K Query Processing Method for Location Based Services., , и . ICAIP, стр. 201-204. ACM, (2017)A development of power consumption measurement system for Android smartphones., , , , и . IMCOM, стр. 95. ACM, (2017)A Semantic Context-Aware Access Control in Pervasive Environments., , , , и . ICCSA (2), том 3981 из Lecture Notes in Computer Science, стр. 165-174. Springer, (2006)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , и . Sensors, 14 (7): 12937-12957 (2014)Implementation of OSD Security Framework and Credential Cache., , , и . GPC, том 4459 из Lecture Notes in Computer Science, стр. 666-671. Springer, (2007)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , и . KES (1), том 4692 из Lecture Notes in Computer Science, стр. 672-679. Springer, (2007)