From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient identity-based signature over NTRU lattice., , , и . Frontiers Inf. Technol. Electron. Eng., 17 (2): 135-142 (2016)Linear spans of optimal sets of frequency hopping sequences., , и . RAIRO Theor. Informatics Appl., 46 (3): 343-354 (2012)Optimized byzantine fault tolerant algorithm for improving performance and security with trust values., , , и . IET Blockchain, 4 (1): 1-17 (марта 2024)An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information., , , , и . J. Inf. Process., (2021)End-To-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach., , , , и . Ad Hoc Sens. Wirel. Networks, 29 (1-4): 265-285 (2015)Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)., , , и . J. Inf. Secur. Appl., (2019)Source delay in mobile ad hoc networks., , , и . Ad Hoc Networks, (2015)Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing., , , , , , и . J. Cloud Comput., 12 (1): 174 (декабря 2023)AES-128 under HHL algorithm., , , и . Quantum Inf. Comput., 22 (3&4): 209-240 (2022)MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions., , , и . Future Gener. Comput. Syst., (2019)