From post

Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol.

, , и . EIDWT, том 6 из Lecture Notes on Data Engineering and Communications Technologies, стр. 497-508. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and bandwidth allocation of cognitive relay networks with energy harvesting nodes., , , и . ICCC, стр. 1-6. IEEE, (2016)Wireless energy harvesting and information transfer in cognitive two-way relay networks., , , , и . GLOBECOM, стр. 3465-3470. IEEE, (2014)End-To-End Graph-based Deep Semi-Supervised Learning., , и . CoRR, (2020)A Unified Attribute-Based Encryption Data Sharing Scheme Matching Industrial Internet Framework., и . IEEE Internet Things J., 11 (5): 9153-9170 (2024)Meta Relational Learning-Based Service-Tailored VNF Deployment for B5G Network Slice., , , , , и . IEEE Internet Things J., 10 (24): 22542-22554 (декабря 2023)Q&A participation and behavioral patterns on academic social networking sites: a comparative study of academic, corporate and government institutions on ResearchGate., , , и . Aslib J. Inf. Manag., 74 (3): 495-521 (2022)MCU: A Task-centric Framework for Open-ended Agent Evaluation in Minecraft., , , и . CoRR, (2023)The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks., , , , , , , , и . CoRR, (2023)Volumization as a Natural Generalization of Weight Decay., , , и . CoRR, (2020)Quasi-Balanced Self-Training on Noise-Aware Synthesis of Object Point Clouds for Closing Domain Gap., , , , и . ECCV (33), том 13693 из Lecture Notes in Computer Science, стр. 728-745. Springer, (2022)