From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable and efficient key management for heterogeneous sensor networks., , , и . J. Supercomput., 45 (1): 44-65 (2008)Analysis of Internet Download Manager for collection of digital forensic artefacts., , и . Digit. Investig., 7 (1-2): 90-94 (2010)A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks., и . IMECS, стр. 1395-1400. Newswood Limited, (2007)Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks., , и . ISA, том 5576 из Lecture Notes in Computer Science, стр. 722-731. Springer, (2009)Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication., , и . ISA, том 76 из Communications in Computer and Information Science, стр. 198-208. Springer, (2010)RSSI Based Implementation of Indoor Positioning Visible Light Communication System in NS-3., , , , , и . ICC, стр. 1-6. IEEE, (2021)Security Attacks and Countermeasures on Cloud Assisted IoT Applications., и . SmartCloud, стр. 213-217. IEEE, (2018)A secure ECC-based RFID mutual authentication protocol for internet of things., , , и . J. Supercomput., 74 (9): 4281-4294 (2018)A cluster-based key agreement scheme using keyed hashing for Body Area Networks., , , и . Multim. Tools Appl., 66 (2): 201-214 (2013)DHCP attacking tools: an analysis., , , и . J. Comput. Virol. Hacking Tech., 17 (2): 119-129 (2021)