From post

Error Performance of Successive Interference Cancellation Schemes in MIMO Systems.

, , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 649-655. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network., , и . IMIS, стр. 143-147. IEEE Computer Society, (2012)Analysis of Packet Size on VOIP Performance., , , , , и . International Conference on Internet Computing, стр. 996-1001. CSREA Press, (2002)Study on Signature Verification Process for the Firmware of an Android Platform., , , , и . IMIS, том 773 из Advances in Intelligent Systems and Computing, стр. 540-545. Springer, (2018)Extraction of Platform-unique Information as an Identifier., , , , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 3 (4): 85-99 (2012)A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services., , , , , и . J. Sensors, (2018)Unintended Certificate Installation into Remote IoT Nodes., , , , и . IMIS, том 994 из Advances in Intelligent Systems and Computing, стр. 845-854. Springer, (2019)A Brief Survey on Rootkit Techniques in Malicious Codes., , , , и . J. Internet Serv. Inf. Secur., 2 (3/4): 134-147 (2012)Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem., , , , и . INFOCOM Workshops, стр. 980-984. IEEE, (2016)Survey on distributed mobility management schemes for Proxy mobile IPv6., , , , , , и . CCNC, стр. 132-138. IEEE, (2014)A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment., , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 215-221. Springer, (2020)