Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coupling Multiagent Simulation and GIS – an Application in Waste Management, , and . (2009)Burst error correction using binary multiplication without carry., , and . MILCOM, page 305-309. IEEE, (2011)Efficient burst error correction method for application in low frequency channels and data storage units., , and . DSP, page 1-6. IEEE, (2011)Efficient zero - Knowledge identification based on one way Boolean transformations., , , and . GLOBECOM Workshops, page 275-280. IEEE, (2011)A Markov Model of IoT System Availability Considering DDoS Attacks and Energy Modes of Server and Router., , , and . ICTERI, volume 1844 of CEUR Workshop Proceedings, page 699-712. CEUR-WS.org, (2017)Reliability, Fault Tolerance and Other Critical Components for Survivability in Information Warfare., , , , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 346-370. Springer, (2017)Hash function design for cloud storage data auditing., , and . Theor. Comput. Sci., (2019)Performance Increase of Error Control Operation on Data Transmission., , and . NTMS, page 1-6. IEEE, (2009)Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module., , , and . WSKS (1), volume 111 of Communications in Computer and Information Science, page 573-581. Springer, (2010)Secure and Encrypted Communication System on Mobile Devices., , , and . DESSERT, page 1-6. IEEE, (2022)