From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast multicast scheme with secure network coding in cloud data centers., , , , , и . Comput. Sci. Inf. Syst., 13 (2): 531-545 (2016)Accurate Power Sharing and Synthetic Inertia Control for DC Building Microgrids With Guaranteed Performance., , , , , и . IEEE Access, (2019)CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency., и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 319-335. Springer, (2015)A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity.. Future Gener. Comput. Syst., (2018)Ship detection for Radarsat-2 ScanSAR data using DoG scale-space., , , , , и . IGARSS, стр. 1881-1884. IEEE, (2013)A Resilient Power System Operation Strategy Considering Transmission Line Attacks., , , , , и . IEEE Access, (2018)Vague color image enhancement on fractional differential and improved retinex., , , , и . Color Imaging: Displaying, Processing, Hardcopy, and Applications, том 9395 из SPIE Proceedings, стр. 93950Q. SPIE, (2015)Fuzzy games with communication networks., , , и . GAMENETS, стр. 1-4. IEEE, (2014)Multi-Sensor Registration in High-Precision CMM Based on a Composite Standard., , , , , , и . Sensors, 18 (4): 1220 (2018)Leakage resilient CCA secure IBE with all-but-one lossy filter.. Int. J. Ad Hoc Ubiquitous Comput., 21 (4): 266-272 (2016)