From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribute-Based Access Control with Hidden Policies and Hidden Credentials., , и . IEEE Trans. Computers, 55 (10): 1259-1270 (2006)CHANG-ES IV: Radio continuum emission of 35 edge-on galaxies observed with the Karl G. Jansky Very Large Array in D-configuration, Data Release 1, , , , , , , , , и 14 other автор(ы). (2015)cite arxiv:1508.05153Comment: 70 pages, of which 35 pages present the data of each galaxy.Revisiting the foundations of dominant-strategy mechanisms., и . J. Econ. Theory, (2018)Certificateless and identity-based authenticated asymmetric group key agreement., , , , , , и . Int. J. Inf. Sec., 16 (5): 559-576 (2017)Secure Outsourcing of Sequence Comparisons., и . Privacy Enhancing Technologies, том 3424 из Lecture Notes in Computer Science, стр. 63-78. Springer, (2004)A Pairing-Based DAA Scheme Further Reducing TPM Resources., и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 181-195. Springer, (2010)VLR group signatures with indisputable exculpability and efficient revocation., и . IJIPSI, 1 (2/3): 129-159 (2012)UML Modeling and Parametric Design for Cross Shaft Universal Coupling CAD System., и . J. Softw., 7 (9): 2069-2075 (2012)Simplified security notions of direct anonymous attestation and a concrete scheme from pairings., , и . Int. J. Inf. Sec., 8 (5): 315-330 (2009)The revealed preference theory of stable matchings with one-sided preferences., , и . Games Econ. Behav., (2020)