From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Establishment of Security Levels in Trusted Cloud Computing Platforms., , , и . GreenCom/iThings/CPScom, стр. 2119-2122. IEEE, (2013)Steganalysis of LSB Speech with Low Embedding Rates based on Joint Probability., и . ICCNS, стр. 6-11. ACM, (2017)Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec., , и . IEEE Trans. Inf. Forensics Secur., 6 (2): 296-306 (2011)De Bruijn Graph-Based Whole-Genomic Sequence Assembly Algorithms and Applications., , , , и . GreenCom/iThings/CPScom, стр. 2094-2097. IEEE, (2013)Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card., , и . Int. J. Commun. Syst., 27 (11): 2691-2702 (2014)Network service registration based on role-goal-process-service meta-model in a P2P network., , , и . IET Commun., 6 (12): 1632-1639 (2012)Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme., , и . IEEE J. Biomed. Health Informatics, 21 (2): 465-475 (2017)Negative Survey-Based Privacy Protection of Cloud Data., и . ICSI (2), том 9141 из Lecture Notes in Computer Science, стр. 151-159. Springer, (2015)Audio steganography with AES for real-time covert voice over internet protocol communications., , , и . Sci. China Inf. Sci., 57 (3): 1-14 (2014)Dynamic Knowledge Repository-Based Security Auxiliary System of User Behavior., , , и . GreenCom/iThings/CPScom, стр. 2081-2084. IEEE, (2013)