From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A vulnerability study of geographic routing in Underwater Acoustic Networks., , , и . CNS, стр. 109-117. IEEE, (2013)Alternative application-specific processor architectures for fast arbitrary bit permutations., , и . Int. J. Embed. Syst., 3 (4): 219-228 (2008)Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors., , , и . IEEE Trans. Very Large Scale Integr. Syst., 18 (11): 1519-1532 (2010)SoK: Sharding on Blockchain., , , и . AFT, стр. 41-61. ACM, (2019)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , и . FDTC, стр. 29-39. IEEE Computer Society, (2014)Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool., и . ITNG, стр. 359-365. IEEE Computer Society, (2011)Chord-Based Key Establishment Schemes for Sensor Networks., , и . ITNG, стр. 731-737. IEEE Computer Society, (2008)A DSP implementation of OFDM acoustic modem., , , и . Underwater Networks, стр. 89-92. ACM, (2007)An Advanced GNU Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer., , , , , и . IEEE Internet Things J., 8 (11): 9206-9218 (2021)Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors., , , и . ICCD, стр. 187-193. IEEE, (2007)