From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes.. Int. J. Netw. Secur., 17 (2): 142-149 (2015)A survey of lattice based expressive attribute based encryption., , , , , и . Comput. Sci. Rev., (2022)Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT., , , , , и . IACR Cryptol. ePrint Arch., (2020)The robust deep learning-based schemes for intrusion detection in Internet of Things environments., , , , и . Ann. des Télécommunications, 76 (5-6): 273-285 (2021)Complementary set encryption for privacy-preserving data consolidation., , , , и . Inf. Sci., (2022)Model of the intrusion detection system based on the integration of spatial-temporal features., , , , , и . Comput. Secur., (2020)Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices., , , и . Trans. Emerg. Telecommun. Technol., (2019)Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network., , , , и . Int. J. Distributed Sens. Networks, 16 (6): 155014772092873 (2020)ECC-based lightweight authentication and access control scheme for IoT E-healthcare., , , , и . Soft Comput., 26 (9): 4441-4461 (2022)Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map., , и . Int. J. Netw. Secur., 19 (2): 313-322 (2017)