From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Linear Algorithm for the Two Path Problem on Chordal Graphs., , и . FSTTCS, том 338 из Lecture Notes in Computer Science, стр. 49-66. Springer, (1988)A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme., , , и . ProvSec, том 11192 из Lecture Notes in Computer Science, стр. 111-128. Springer, (2018)Identity Based Online/Offline Encryption and Signcryption Schemes Revisited., , и . InfoSecHiComNet, том 7011 из Lecture Notes in Computer Science, стр. 111-127. Springer, (2011)Lattice Based Efficient Threshold Public Key Encryption Scheme., , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 4 (4): 93-107 (2013)A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network., , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (4): 46-60 (2012)An Efficient Distributed Algorithm For st-numbering The Verices Of A Biconnected Graph, и . J. Univers. Comput. Sci., 1 (9): 633-650 (1995)Reoptimization of Path Vertex Cover Problem., , и . CoRR, (2019)Lattice Based Identity Based Proxy Re-Encryption Scheme., , и . J. Internet Serv. Inf. Secur., 3 (3/4): 38-51 (2013)Guest Editorial: Special Issue on Cyber Security Protections and Applications., , и . J. Internet Serv. Inf. Secur., 4 (2): 1-3 (2014)Edge-disjoint paths in permutation graphs., и . Discussiones Mathematicae Graph Theory, 15 (1): 59-72 (1995)