From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A new proxy re-encryption scheme for protecting critical information systems., , и . J. Ambient Intell. Humaniz. Comput., 6 (6): 699-711 (2015)Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart., , , , и . Int. J. Inf. Technol. Web Eng., 10 (3): 17-32 (2015)Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet., , , и . 3PGCIC, том 96 из Lecture Notes in Networks and Systems, стр. 378-388. Springer, (2019)A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud Computing., , , и . 3PGCIC, том 1 из Lecture Notes on Data Engineering and Communications Technologies, стр. 801-812. Springer, (2016)Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation., , , , и . Inf. Process. Manag., 57 (6): 102287 (2020)Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme., , , и . J. Syst. Softw., 84 (2): 219-225 (2011)Provable Secure Generalized Signcryption., , и . J. Comput., 5 (5): 807-814 (2010)Improved Online/Offline Attribute Based Encryption and More., , и . EIDWT, том 6 из Lecture Notes on Data Engineering and Communications Technologies, стр. 603-610. Springer, (2017)Toward Secure K-means Clustering Based on Homomorphic Encryption in Cloud., , , , и . EIDWT, том 118 из Lecture Notes on Data Engineering and Communications Technologies, стр. 52-62. Springer, (2022)On the Security of a Cloud Auditing Storage Protocol., , , и . INCoS, том 182 из Lecture Notes on Data Engineering and Communications Technologies, стр. 234-243. Springer, (2023)