From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lattice Attack on the Knapsack Cipher 0/255., и . INCoS, стр. 577-580. IEEE, (2012)A Novel Combinatorial Public Key Cryptosystem., и . Informatica, 21 (4): 611-626 (2010)A threshold hybrid encryption method for integrity audit without trusted center., , , , , и . J. Cloud Comput., 10 (1): 3 (2021)Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation., , , , и . J. Ambient Intell. Humaniz. Comput., 10 (2): 429-438 (2019)Lattice-based deniable ring signatures., , , , , и . Int. J. Inf. Sec., 18 (3): 355-370 (2019)Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid., , , и . IEEE Access, (2020)Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys., , , , , , и . IEEE Internet Things J., 11 (2): 3430-3445 (января 2024)Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT., , , , , , и . IEEE Internet Things J., 9 (21): 21958-21970 (2022)Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks., , и . IEEE Internet Things J., 8 (7): 5973-5984 (2021)A Note on P/poly Validity of GVW15 Predicate Encryption Scheme., , , и . IACR Cryptol. ePrint Arch., (2021)