From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Considerations in Cloud Computing Virtualization Environment., и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 208-215. Springer, (2013)A hybrid user authentication protocol for mobile IPTV service., , и . Multimedia Tools Appl., 65 (2): 283-296 (2013)Generating knowledge for the identification of device failure causes and the prediction of the times-to-failure in u-Healthcare environments., , , и . Personal and Ubiquitous Computing, 17 (7): 1383-1394 (2013)Multi-frame Beacon Management for constructing interference-avoided LR-WPAN., , и . Int. J. Ad Hoc Ubiquitous Comput., 5 (3): 178-188 (2010)A general compiler for password-authenticated group key exchange protocol in the standard model., , , и . Discret. Appl. Math., (2018)A Pervasive Secret Sharing Scheme For Embedded Visual Communication System., , , , и . Intell. Autom. Soft Comput., 16 (3): 433-447 (2010)Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks., , , , , и . J. Database Manag., 34 (2): 1-25 (2023)An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF(2)., , , и . Comput. Math. Appl., 60 (2): 338-346 (2010)Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard., , , , и . ISPA Workshops, том 4743 из Lecture Notes in Computer Science, стр. 245-254. Springer, (2007)A robust and secure time-domain ICI canceller for OFDM based ubiquitous systems in time-varying multipath channels., , , , , и . J. Supercomput., 45 (1): 29-43 (2008)