From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A constant rounds group key agreement protocol without using hash functions., , , и . Int. J. Netw. Manag., 19 (6): 457-464 (2009)Adaptively secure broadcast encryption with authenticated content distributors., , , , и . Multim. Tools Appl., 79 (11-12): 7889-7910 (2020)Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing., , , , , и . IEEE Trans. Serv. Comput., 15 (2): 724-735 (2022)Forward privacy multikeyword ranked search over encrypted database., , , , , и . Int. J. Intell. Syst., 37 (10): 7356-7378 (2022)An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems., , , , и . Wirel. Commun. Mob. Comput., (2018)Identity Based Proxy Re-encryption Scheme under LWE., , , , и . KSII Trans. Internet Inf. Syst., 11 (12): 6116-6132 (2017)A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption., , и . Sci. China Inf. Sci., 59 (3): 32109:1-32109:16 (2016)A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications., , и . Wirel. Pers. Commun., 86 (3): 1593-1610 (2016)Attribute-based fuzzy identity access control in multicloud computing environments., , , и . Soft Comput., 22 (12): 4071-4082 (2018)Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing., , , , и . Soft Comput., 21 (18): 5265-5279 (2017)