From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment., , и . J. Supercomput., 73 (3): 1140-1151 (2017)Impersonation Attack on a Strong ID-Based Key Distribution., , и . IEICE Trans. Commun., 91-B (8): 2702-2703 (2008)Side Channel Cryptanalysis on XTR Public Key Cryptosystem., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (5): 1214-1223 (2005)Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications., , , , и . IEICE Trans. Inf. Syst., 91-D (5): 1481-1484 (2008)U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home., , , и . J. Intell. Manuf., 20 (3): 337-346 (2009)A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data., , , , , и . Simul. Model. Pract. Theory, 18 (4): 431-435 (2010)Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis., , , , , и . Peer-to-Peer Netw. Appl., 8 (4): 716-732 (2015)Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan., , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 348-356. Springer, (2015)Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study., и . International Conference on Computational Science (3), том 4489 из Lecture Notes in Computer Science, стр. 1040-1047. Springer, (2007)Practical off-line authentication., , , и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 141-148. SPIE, (2002)