From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations., , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 529-548. Springer, (2018)Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks., и . NSS, том 7645 из Lecture Notes in Computer Science, стр. 503-515. Springer, (2012)A Comment on "MABS: Multicast Authentication Based on Batch Signature".. IEEE Trans. Mob. Comput., 11 (11): 1775-1776 (2012)Propagation of active worms: A survey., , и . Comput. Syst. Sci. Eng., (2009)A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card., , и . Concurr. Comput. Pract. Exp., 23 (12): 1386-1398 (2011)Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization., , , и . CNS, стр. 1-9. IEEE, (2018)A Cost-Efficient Secure Multimedia Proxy System.. IEEE Trans. Multim., 10 (6): 1214-1220 (2008)A secure and efficient data aggregation scheme for wireless sensor networks., , и . Concurr. Comput. Pract. Exp., 23 (12): 1414-1430 (2011)Publishing and sharing encrypted data with potential friends in online social networks., , и . Secur. Commun. Networks, 7 (2): 409-421 (2014)Generating Correlated Digital Certificates: Framework and Applications., и . IEEE Trans. Inf. Forensics Secur., 11 (6): 1117-1127 (2016)