From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements., , , и . IEEE Communications Magazine, 54 (2): 32-38 (2016)MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , и . COSADE, том 7275 из Lecture Notes in Computer Science, стр. 231-248. Springer, (2012)Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , и . MASS Workshops, стр. 97-100. IEEE, (2019)An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System., , и . IEEE Access, (2019)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)Accelerating higher-order masking of AES using composite field and SIMD., , , и . ISSPIT, стр. 575-580. IEEE Computer Society, (2015)Algebraic Differential Fault Attacks on LED using a Single Fault Injection., , , , , и . IACR Cryptology ePrint Archive, (2012)Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks., , , , и . WASA, том 5682 из Lecture Notes in Computer Science, стр. 305-314. Springer, (2009)Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks., , , , и . IEEE Trans. Mob. Comput., 13 (5): 1035-1047 (2014)SDRT: A reliable data transport protocol for underwater sensor networks., , , , и . Ad Hoc Networks, 8 (7): 708-722 (2010)