From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure three-party computational protocols for triangle area., , и . Int. J. Inf. Sec., 15 (1): 1-13 (2016)Identity-Based Chameleon Hash Scheme Without Key Exposure., , , и . IACR Cryptology ePrint Archive, (2009)An Efficient Secure Dynamic Skyline Query Model., , , , , , и . CoRR, (2020)Privacy-preserving authentication for general directed graphs in industrial IoT., , , и . Inf. Sci., (2019)Blockchain-based multiple groups data sharing with anonymity and traceability., , и . Sci. China Inf. Sci., (2020)Wearable Ankle Robots in Post-stroke Rehabilitation of Gait: A Systematic Review., , , , , , , и . Frontiers Neurorobotics, (2019)M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet., , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 612-621. Springer, (2014)Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption., , , , , и . ESORICS, том 8134 из Lecture Notes in Computer Science, стр. 592-609. Springer, (2013)Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation., , и . IEEE Trans. Computers, 65 (8): 2363-2373 (2016)Secure Deduplication with Efficient and Reliable Convergent Key Management., , , , , и . IEEE Trans. Parallel Distributed Syst., 25 (6): 1615-1625 (2014)