From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trusted-link: web-link enhancement for integrity and trustworthiness., , и . Digital Identity Management, стр. 17-24. ACM, (2006)Modulus Search for Elliptic Curve Cryptosystems., , и . ASIACRYPT, том 1716 из Lecture Notes in Computer Science, стр. 1-7. Springer, (1999)Cloud Computing - Current Status and Future Directions.. J. Inf. Process., 24 (2): 183-194 (2016)SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response., и . ICITST, стр. 283-287. IEEE, (2013)Three-Factor User Authentication Method Using Biometrics Challenge Response., и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 395-396. Springer, (2013)Proposal and Evaluation of Dynamic Object-Oriented Programming., и . Syst. Comput. Jpn., 21 (5): 1-14 (1990)Certificate-less user authentication with consent., , и . Digital Identity Management, стр. 11-16. ACM, (2007)Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method., и . CRYPTO, том 740 из Lecture Notes in Computer Science, стр. 345-357. Springer, (1992)