From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks., , , , , и . IEEE Internet Things J., 5 (4): 2496-2505 (2018)Physical characteristics of wireless communication channels for secret key establishment: A survey of the research., , , , и . Comput. Secur., (2018)Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors., , и . Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier, (2017)Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications., , , , и . IEEE Trans. Veh. Technol., 70 (3): 2310-2321 (2021)A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol., , , , и . IOTSMS, стр. 1-8. IEEE, (2022)Towards an Evaluation Framework for Extended Reality Authentication Schemes., , и . CHI Extended Abstracts, стр. 339:1-339:6. ACM, (2024)Adaptive Traffic Fingerprinting for Darknet Threat Intelligence., , , и . CoRR, (2018)Anonymity networks and the fragile cyber ecosystem., , и . Netw. Secur., 2016 (3): 10-18 (2016)Security in Online Games: Current Implementations and Challenges., , , , и . Handbook of Big Data and IoT Security, Springer, (2019)Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility., , , , и . Telematics Informatics, 34 (4): 339-349 (2017)