From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems., , , и . Wireless Personal Communications, 97 (4): 5171-5184 (2017)A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE., , , , , , и . IEEE Access, (2021)Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices., , , , , и . IEEE Access, (2022)Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.. IMACC, том 1746 из Lecture Notes in Computer Science, стр. 307-. Springer, (1999)New mutual agreement protocol to secure mobile RFID-enabled devices., , и . Inf. Secur. Tech. Rep., 13 (3): 151-157 (2008)IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction., , , , , , и . IEEE Access, (2020)A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication., , , , и . Int. J. Commun. Syst., 24 (4): 461-472 (2011)Recent advances of smart glass application security and privacy., и . ICITST, стр. 65-69. IEEE, (2015)New Two-Level µTESLA Protocol for IoT Environments., , и . SERVICES, стр. 84-91. IEEE, (2019)New data poison attacks on machine learning classifiers for mobile exfiltration., , , , , , , , , и . CoRR, (2022)