From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions., , , и . J. Real Time Image Process., 17 (5): 1597-1608 (2020)Analysis of hybrid router-assisted reliable multicast protocols in lossy networks., , и . Int. Arab J. Inf. Technol., 14 (1): 26-34 (2017)Using Screen Brightness to Improve Security in Mobile Social Network Access., , , , , и . IEEE Trans. Dependable Secur. Comput., 15 (4): 621-632 (2018)ArA*summarizer: An Arabic text summarization system based on subtopic segmentation and using an A* algorithm for reduction., , и . Expert Syst. J. Knowl. Eng., (2020)Security Ontology for Semantic SCADA., и . ICWIT, том 867 из CEUR Workshop Proceedings, стр. 179-192. CEUR-WS.org, (2012)RFID Authentication Protocols Based on Error-Correcting Codes: A Survey., , , и . Wireless Personal Communications, 96 (1): 509-527 (2017)UML Modeling and Formal Verification of Control/Data Driven Embedded Systems., и . ICECCS, стр. 311-316. IEEE Computer Society, (2009)Weaknesses in Two RFID Authentication Protocols., , , и . C2SI, том 9084 из Lecture Notes in Computer Science, стр. 162-172. Springer, (2015)An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , и . CoRR, (2012)Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks., , и . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)