From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction., и . IIH-MSP, стр. 512-515. IEEE, (2014)Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing., , , , и . Wirel. Commun. Mob. Comput., (2018)A practical lottery using oblivious transfer., , , и . Int. J. Commun. Syst., 29 (2): 277-282 (2016)A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks., и . IEEE Trans. Wirel. Commun., 15 (1): 357-366 (2016)A Novel Electronic English Auction System With a Secure On-Shelf Mechanism., , и . IEEE Trans. Inf. Forensics Secur., 8 (4): 657-668 (2013)Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy., и . Fundam. Informaticae, 76 (1-2): 13-23 (2007)Hiding Digital Watermarks Using Fractal Compression Technique., и . Fundam. Informaticae, 58 (2): 189-202 (2003)A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy., и . Fundam. Informaticae, 131 (2): 167-186 (2014)A Novel Index Coding Scheme for Vector Quantization., , и . Fundam. Informaticae, 71 (2-3): 215-227 (2006)An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network., , , , , , , и . MMM (2), том 11962 из Lecture Notes in Computer Science, стр. 161-174. Springer, (2020)