From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata.. ACRI, том 4173 из Lecture Notes in Computer Science, стр. 627-635. Springer, (2006)A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata., , и . IbPRIA (1), том 3522 из Lecture Notes in Computer Science, стр. 411-418. Springer, (2005)How Engineers Deal with Mathematics Solving Differential Equation., , , , , и . ICCS, том 51 из Procedia Computer Science, стр. 1977-1985. Elsevier, (2015)3D medical data security protection., , и . Expert Syst. Appl., (2016)Virtual cyclic cellular automata, finite group actions and recursive properties., и . Inf. Sci., (2022)Security Countermeasures of a SCIRAS Model for Advanced Malware Propagation., , и . IEEE Access, (2019)A computational propagation model for malware based on the SIR classic model., , и . Neurocomputing, (2022)Modeling epidemics using cellular automata., , и . Appl. Math. Comput., 186 (1): 193-202 (2007)On the invertible cellular automata 150 over Fp., и . Appl. Math. Comput., 219 (10): 5427-5432 (2013)A multi-secret sharing scheme for 3D solid objects.. Expert Syst. Appl., 42 (4): 2114-2120 (2015)