From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security analysis of the generalized key agreement and password authentication protocol., , и . IEEE Communications Letters, 5 (11): 462-463 (2001)Probabilistic authenticated quantum dialogue., и . Quantum Inf. Process., 14 (12): 4631-4650 (2015)Quantum Key Recycling with optimal key recycling rate based on a noise level., , и . CoRR, (2020)On the security of fair blind signature scheme using oblivious transfer., и . Comput. Commun., 22 (3): 287-290 (1999)Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space., , , и . CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 286-298. Springer, (1989)Comment on "Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise"., , и . Quantum Inf. Process., 12 (8): 2871-2875 (2013)Provably secure mutual authentication and key agreement scheme with user anonymity., и . ICICS, стр. 1-5. IEEE, (2013)On the traceability on RSA-based partially signature with low computation., , , и . Appl. Math. Comput., 162 (1): 421-425 (2005)On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes., , , и . Informatica, 18 (1): 55-60 (2007)A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks., и . IEEE Trans. Ind. Electron., 63 (11): 7124-7132 (2016)