From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visual Honey Encryption: Application to Steganography., , , , и . IH&MMSec, стр. 65-74. ACM, (2015)Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings.. IEEE Access, (2019)Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups.. ICISC, том 10157 из Lecture Notes in Computer Science, стр. 101-125. (2016)Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency., , и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2013)Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation., , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 122-133. Springer, (2015)Dynamic Threshold Key Encapsulation with a Transparent Setup., , , и . IACR Cryptol. ePrint Arch., (2024)Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies., , и . IACR Cryptology ePrint Archive, (2012)Visual Honey Encryption: Application to Steganography., , , , и . IACR Cryptology ePrint Archive, (2017)Delegate and Verify the Update Keys of Revocable Identity-Based Encryption.. IEEE Access, (2023)Efficient Revocable Identity-Based Encryption via Subset Difference Methods., , и . IACR Cryptology ePrint Archive, (2014)