From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach., , и . JDCTA, 4 (5): 112-117 (2010)RUN: Residual U-Net for Computer-Aided Detection of Pulmonary Nodules without Candidate Selection., , , , и . CoRR, (2018)An Improved Certificateless Signature Scheme Secure in the Standard Model., , и . Fundam. Informaticae, 88 (1-2): 193-206 (2008)Cryptanalysis of an Identity Based Signcryption without Random Oracles., , и . Fundam. Informaticae, 107 (1): 105-109 (2011)Iterative tighter nonparallel hyperplane support vector clustering with simultaneous feature selection., , и . Clust. Comput., 22 (Supplement): 8035-8049 (2019)Managing an Information System Transformation in Higher Educational Institutions: A Case Study on CMC Portal in Ghana., , и . Int. J. Emerg. Technol. Learn., 14 (22): 232-251 (2019)An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet., , , и . Int. J. Netw. Secur., 19 (6): 940-949 (2017)Distributing the Keys into P2P Network., , и . GCC (1), том 3032 из Lecture Notes in Computer Science, стр. 460-463. Springer, (2003)Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing., , , , и . IEEE Access, (2018)Proxy Re-Encryption in Access Control Framework of Information-Centric Networks., , и . IEEE Access, (2019)