From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device., , , и . CoRR, (2019)SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data., , , , , , и . CoRR, (2023)PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform., , , и . Softw. Impacts, (2021)Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform., , , , , , , и . Entropy, 24 (10): 1379 (2022)The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud., , и . CoRR, (2022)PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching., , , , и . SIN, стр. 1-8. IEEE, (2021)Microtargeting or Microphishing? Phishing Unveiled., , , и . TrustBus, том 12395 из Lecture Notes in Computer Science, стр. 89-105. Springer, (2020)A Practical Steganographic Approach for Matroska Based High Quality Video Files., , , и . AINA Workshops, стр. 684-688. IEEE Computer Society, (2013)PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms., , , , , и . CAMAD, стр. 188-193. IEEE, (2023)Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , и . CoRR, (2019)