From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Revocation in Vehicular Public Key Infrastructures: Balancing privacy and efficiency., , , , и . Veh. Commun., (2021)A Taxonomy Model for Cloud Computing Services., , , , , , и . CLOSER, стр. 56-65. SciTePress, (2011)Privacy-preserving linkage/revocation of VANET certificates without LAs., , , , , и . IACR Cryptology ePrint Archive, (2018)Designing and Assessing Multi-tenant Isolation Strategies for Cloud Networks., , и . ICIN, стр. 214-221. IEEE, (2019)DVID: Adding Delegated Authentication to SPIFFE Trusted Domains., , , , , , , и . AINA (4), том 202 из Lecture Notes on Data Engineering and Communications Technologies, стр. 289-300. Springer, (2024)Tailoring two-dimensional codes for structured lattice-based KEMs and applications to Kyber., , , , и . IACR Cryptol. ePrint Arch., (2024)Survey and comparison of message authentication solutions on wireless sensor networks., , , , , и . Ad Hoc Networks, 11 (3): 1221-1236 (2013)Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem., и . IEEE Trans. Inf. Forensics Secur., (2020)EbitSim: An Enhanced BitTorrent Simulation Using OMNeT++ 4., , , , , , и . MASCOTS, стр. 437-440. IEEE Computer Society, (2011)A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing., , , , , , и . CloudCom, стр. 231-238. IEEE Computer Society, (2011)