From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System., и . CITA, стр. 75-79. (2005)A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction., , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 361-370. Springer, (2011)A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video., , , и . IEEE Trans. Circuits Syst. Video Techn., 27 (11): 2309-2321 (2017)Monogenic Riesz wavelet representation for micro-expression recognition., , , , , и . DSP, стр. 1237-1241. IEEE, (2015)Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , и . Hum. centric Comput. Inf. Sci., (2015)Guess-It-Generator: Generating in a Lewis Signaling Framework through Logical Reasoning., , , и . ACM Multimedia, стр. 6396-6405. ACM, (2022)Metrics for network forensics conviction evidence., , и . ICITST, стр. 1-8. IEEE, (2009)Schatten p-norm based Image-to-Video Adaptation for Video Action Recognition., , , и . IJCNN, стр. 1-8. IEEE, (2023)Proxy Re-encryption with Keyword Search: New Definitions and Algorithms., , , и . FGIT-SecTech/DRBC, том 122 из Communications in Computer and Information Science, стр. 149-160. Springer, (2010)Attacks on SVD-Based Watermarking Schemes., , и . ISI Workshops, том 5075 из Lecture Notes in Computer Science, стр. 83-91. Springer, (2008)