From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Privacy-Strengthened Scheme for E-Healthcare Monitoring System., , и . J. Medical Systems, 36 (5): 2959-2971 (2012)A Practical Inter-sensor Broadcast Authentication Scheme., , , и . HCI (5), том 4554 из Lecture Notes in Computer Science, стр. 399-405. Springer, (2007)Efficient Password-Based Group Key Exchange., , и . TrustBus, том 3184 из Lecture Notes in Computer Science, стр. 191-199. Springer, (2004)Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model., , и . IEEE Access, (2019)Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency., , и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2013)One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange., , и . Communications and Multimedia Security, том 4237 из Lecture Notes in Computer Science, стр. 87-96. Springer, (2006)A secure and efficient key management scheme for wireless sensor networks., , и . SecureComm, стр. 162-167. IEEE, (2007)GA based Adaptive Sampling for Image-based Walkthrough., , и . EGVE, стр. 135-142. Eurographics Association, (2006)Delaunay Triangles Model for Image-Based Motion Retargeting., и . DEFORM/AVATARS, том 196 из IFIP Conference Proceedings, стр. 158-168. Kluwer, (2000)Fraud and financial crime detection model using malware forensics., , , и . Multimedia Tools Appl., 68 (2): 479-496 (2014)