From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-party authenticated key exchange protocol using lattice-based cryptography., и . IACR Cryptology ePrint Archive, (2016)Improved hill-climbing methods in the design of bijective S-boxes., , , , и . ICNC, стр. 2378-2380. IEEE, (2010)New optimal constructions of conflict-avoiding codes of odd length and weight 3., , и . Des. Codes Cryptogr., 73 (3): 791-804 (2014)基于区块链的信息共享及安全多方计算模型 (Information Sharing and Secure Multi-party Computing Model Based on Blockchain)., , и . 计算机科学, 46 (9): 162-168 (2019)WSN中基于非线性自适应PSO的分簇策略 (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive PSO Algorithm)., и . 计算机科学, 45 (5): 44-48 (2018)Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays., , и . Ad Hoc Networks, (2018)High-order graph matching based on ant colony optimization., , , и . Neurocomputing, (2019)Lossy trapdoor functions based on the PLWE., , , и . Clust. Comput., 22 (Supplement): 5647-5654 (2019)Balanced quaternary sequences of even period with optimal autocorrelation., и . IET Commun., 13 (12): 1808-1812 (2019)A Light-Weighted Convolutional Neural Network for Bitemporal SAR Image Change Detection., , , , , , и . CoRR, (2020)