From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerabilities of Android OS-Based Telematics System., , , , и . Wireless Personal Communications, 92 (4): 1511-1530 (2017)Robust E-mail protocols with perfect forward secrecy., , и . IEEE Communications Letters, 10 (6): 510-512 (2006)A 5Gb/s/pin 16Gb LPDDR4/4X Reconfigurable SDRAM with Voltage-High Keeper and a Prediction-based Fast-tracking ZQ Calibration., , , , , , , , , и 14 other автор(ы). VLSI Circuits, стр. 114-. IEEE, (2019)Improved hidden vector encryption with short ciphertexts and tokens., и . Des. Codes Cryptogr., 58 (3): 297-319 (2011)Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique., , , , , , и . ICA3PP (4), том 11337 из Lecture Notes in Computer Science, стр. 85-97. Springer, (2018)SmartRescue: Multi Agent System Based on Location and Context Aware Information., и . MMAS, том 3446 из Lecture Notes in Computer Science, стр. 295-308. Springer, (2004)Efficient Multicast Key Management for Stateless Receivers., , , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 497-509. Springer, (2002)Secure Index Search for Groups., , и . TrustBus, том 3592 из Lecture Notes in Computer Science, стр. 128-140. Springer, (2005)Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes., и . EuroPKI, том 4582 из Lecture Notes in Computer Science, стр. 94-109. Springer, (2007)N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., и . ACNS, том 3531 из Lecture Notes in Computer Science, стр. 75-90. (2005)