From post

Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.

, , и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 189-199. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

5G enabled cooperative collision avoidance: System design and field test., , , , , , , , , и 3 other автор(ы). WoWMoM, стр. 1-6. IEEE, (2017)Adaptive Fault Tolerant Controller for Nonlinear Active Suspension., и . ICIRA (4), том 14270 из Lecture Notes in Computer Science, стр. 3-11. Springer, (2023)A new modeling algorithm based on ANFIS and GMDH., , и . J. Intell. Fuzzy Syst., 29 (4): 1321-1329 (2015)Perceptual harmonic cepstral coefficients for speech recognition in noisy environment., и . ICASSP, стр. 125-128. IEEE, (2001)Sub-state tying in tied mixture hidden Markov models., и . ICASSP, стр. 1013-1016. IEEE, (2000)Modeling TCG-Based Secure Systems with Colored Petri Nets., , , , и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 67-86. Springer, (2010)Transcriptome Dynamics and Cell Dialogs Between Oocytes and Granulosa Cells in Mouse Follicle Development., , , , , , , , , и 1 other автор(ы). Genom. Proteom. Bioinform., (2024)Document Nearest Neighbors Query Based on Pairwise Similarity with MapReduce., , , и . ICA3PP (1), том 11334 из Lecture Notes in Computer Science, стр. 34-45. Springer, (2018)A Retransmission Scheme in IEEE 802.11be Synchronized Multi-Link WLANs., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 106 (5): 871-875 (мая 2023)Perceptual harmonic cepstral coefficients as the front-end for speech recognition., и . INTERSPEECH, стр. 309-312. ISCA, (2000)