From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems., , , и . Symmetry, 8 (9): 85 (2016)Compressive Random Access Using a Common Overloaded Control Channel., , и . GLOBECOM Workshops, стр. 1-6. IEEE, (2015)Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme., , , , , и . Int. J. Netw. Secur., 19 (1): 27-38 (2017)High Speed Neuromorphic Vision-Based Inspection of Countersinks in Automated Manufacturing Processes., , , , , , , и . CoRR, (2023)NLOS Identification for Indoor Localization using Random Forest Algorithm., , , и . WSA, стр. 1-5. VDE / IEEE, (2018)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , и . IEEE Access, (2018)Insecurity of an IBEET Scheme and an ABEET Scheme., , , , , и . IEEE Access, (2019)IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks., , , , и . Mob. Networks Appl., 25 (1): 223-233 (2020)User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System., , , , , и . Int. J. Netw. Secur., 18 (4): 769-781 (2016)An Improved Radar ECCM Method Based on Orthogonal Pulse Block and Parallel Matching Filter., , , и . J. Commun., 10 (8): 610-614 (2015)