From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment., , , и . Secur. Commun. Networks, 9 (11): 1331-1339 (2016)Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture., , , и . Secur. Commun. Networks, 9 (11): 1321-1330 (2016)An effective algorithm for the spark of sparse binary measurement matrices., , , и . Appl. Math. Comput., (2020)Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control., , , , , и . Neural Comput. Appl., 30 (7): 2217-2227 (2018)A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme., , , , , и . J. Inf. Secur. Appl., (июня 2023)Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs., , , , и . Appl. Math. Comput., (2022)Synchronization control of memristor-based recurrent neural networks with perturbations., , , , и . Neural Networks, (2014)Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm., , , , и . Expert Syst. Appl., 39 (8): 6887-6896 (2012)General Theory of Security and a Study Case in Internet of Things., , , и . IEEE Internet Things J., 4 (2): 592-600 (2017)Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System., , , и . IEEE Internet Things J., 7 (3): 2432-2451 (2020)