From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

General Theory of Security and a Study Case in Internet of Things., , , и . IEEE Internet Things J., 4 (2): 592-600 (2017)Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System., , , и . IEEE Internet Things J., 7 (3): 2432-2451 (2020)Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations., , , , и . Neural Processing Letters, 47 (2): 679-696 (2018)Multiple Vectors Propagation of Epidemics in Complex Networks., , , , и . CoRR, (2013)A secure and effective anonymous authentication scheme for roaming service in global mobility networks., , , и . CoRR, (2013)Multiple routes transmitted epidemics on multiplex networks., , , , и . CoRR, (2013)Synchronization control of memristor-based recurrent neural networks with perturbations., , , , и . Neural Networks, (2014)Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment., , , и . Secur. Commun. Networks, 9 (11): 1331-1339 (2016)Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture., , , и . Secur. Commun. Networks, 9 (11): 1321-1330 (2016)Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays., , , , и . IEEE Access, (2020)