From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function., , , и . SecITC, том 13809 из Lecture Notes in Computer Science, стр. 203-221. Springer, (2022)Packet Analysis and Information Theory on Attack Detection for Modbus TCP., , , , и . IECON, стр. 1-6. IEEE, (2023)A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (10): 2577-2588 (2003)Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage., , , и . CODASPY, стр. 312-323. ACM, (2022)A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule., , , , , , и . ISITA, стр. 382-386. IEEE, (2020)Card-Based Majority Voting Protocols with Three Inputs Using Three Cards., , , , , и . ISITA, стр. 218-222. IEEE, (2018)Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations., , , , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 500-517. (2016)Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption., , , , , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 350-364. (2016)Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful., , и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 504-523. Springer, (2013)Strongly secure ramp secret sharing schemes for general access structures., и . Inf. Process. Lett., 97 (2): 52-57 (2006)