From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , и 1 other автор(ы). IWBBIO, стр. 253-254. Copicentro Editorial, (2013)Characterizing Normal and Pathological Gait through Permutation Entropy., , , , , , и . Entropy, 20 (1): 77 (2018)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , и . IEEE Syst. J., 10 (3): 912-921 (2016)A Novel Method to Maintain Privacy in Mobile Agent Applications., , , , и . CANS, том 3810 из Lecture Notes in Computer Science, стр. 247-260. Springer, (2005)A security framework for a workflow-based grid development platform., , , и . Comput. Stand. Interfaces, 32 (5-6): 230-245 (2010)Anonymity analysis in credentials-based systems: A formal framework., , и . Comput. Stand. Interfaces, 30 (4): 253-261 (2008)WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids., и . Future Gener. Comput. Syst., (2014)Virtual certificates and synthetic certificates: new paradigms for improving public key validation., , , и . Comput. Commun., 26 (16): 1826-1838 (2003)A First Approach to Provide Anonymity in Attribute Certificates., , , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 402-415. Springer, (2004)On the energy cost of authenticated key agreement in wireless sensor networks., , и . Wirel. Commun. Mob. Comput., 12 (1): 133-143 (2012)