From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data., , , , и . CoRR, (2019)Utilizing QR codes to verify the visual fidelity of image datasets for machine learning., , , , , , и . J. Netw. Comput. Appl., (2021)Biometrics for Electronic Health Records., , и . J. Medical Syst., 34 (5): 975-983 (2010)Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security., , , , , и . IACR Cryptol. ePrint Arch., (2006)Password Protected Universal Thresholdizer., , , и . IACR Cryptol. ePrint Arch., (2024)A resilient identity-based authenticated key exchange protocol., , и . Secur. Commun. Networks, 8 (13): 2279-2290 (2015)Non-delegatable Identity-based Designated Verifier Signature., , и . IACR Cryptol. ePrint Arch., (2009)Quantum-Safe Puncturable Signatures With Their Application in Blockchain., , , и . IEEE Trans. Inf. Forensics Secur., (2024)Revisiting Optimistic Fair Exchange Based on Ring Signatures., , и . IEEE Trans. Inf. Forensics Secur., 9 (11): 1883-1892 (2014)An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data., , , , и . IEEE Trans. Inf. Forensics Secur., 12 (10): 2402-2415 (2017)