From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network., , и . HPCC, том 4208 из Lecture Notes in Computer Science, стр. 280-289. Springer, (2006)A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service., , и . Wireless Personal Communications, 97 (1): 1-17 (2017)Welcome message from FINGNet-2012 international workshop organizers, , , , и . Proceedings-6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, (2012)Welcome message from FINGNet-2013 international workshop organizers, , , , и . Proceedings-7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, стр. 51. (2013)Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS., , и . ICACT, стр. 63-67. IEEE, (2018)Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks., , , и . ICCSA (4), том 3983 из Lecture Notes in Computer Science, стр. 440-447. Springer, (2006)Performance evaluation of FDDI network and interconnected heterogeneous networks., и . LCN, стр. 75-83. IEEE Computer Society, (1990)Authentication for Mobile Open IPTV Service Security., , и . IMIS, стр. 381-385. IEEE Computer Society, (2016)Securing information flow in content delivery networks with visual and quantum cryptography., , и . ICOIN, стр. 463-468. IEEE Computer Society, (2016)Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure., и . ICOIN, стр. 541-544. IEEE Computer Society, (2014)