From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Attribute-Based Secure Keyword Search on the Cloud Storage., , , и . IACR Cryptology ePrint Archive, (2017)Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm., , и . IACR Cryptology ePrint Archive, (2014)New Public Key Cryptosystems Using Polynomials over Non-commutative Rings., , и . IACR Cryptology ePrint Archive, (2007)New Public Key Authentication Frameworks with Lite Certification Authority., , и . IACR Cryptology ePrint Archive, (2006)Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability., и . IACR Cryptology ePrint Archive, (2015)Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks., , , , , и . IEEE Internet Things J., 7 (4): 2663-2678 (2020)Threshold password authentication against guessing attacks in Ad hoc networks., , и . Ad Hoc Networks, 5 (7): 1046-1054 (2007)A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme., и . Appl. Math. Comput., 168 (1): 135-140 (2005)SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks., , , , , и . IEEE Trans. Intell. Transp. Syst., 23 (8): 11752-11766 (2022)Designated server-aided revocable identity-based keyword search on lattice., , , , и . EURASIP J. Wirel. Commun. Netw., 2021 (1): 174 (2021)