From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Security Protocol for Biometric Smart Cards., , , и . CARDIS, USENIX, (2002)Low power showdown: comparison of five DSP platforms implementing an LPC speech codec., , и . ICASSP, стр. 1125-1128. IEEE, (2001)Energy-Memory-Security Tradeoffs in Distributed Sensor Networks., , и . ADHOC-NOW, том 3158 из Lecture Notes in Computer Science, стр. 70-81. Springer, (2004)Reducing radio energy consumption of key management protocols for wireless sensor networks., , , и . ISLPED, стр. 351-356. ACM, (2004)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 106-118. Springer, (2005)Securing Embedded Systems., , , и . IEEE Secur. Priv., 4 (2): 40-49 (2006)Impacts of distributors and group purchasing organizations on hospital efficiency and profitability: a bilateral data envelopment analysis model., , , , и . Int. Trans. Oper. Res., 30 (1): 476-502 (2023)Implementations and Optimizations of Pipeline FFTs on Xilinx FPGAs., и . ReConFig, стр. 325-330. IEEE Computer Society, (2008)Teaching Trade-offs in System-level Design Methodologies., , , и . MSE, стр. 62-53. IEEE Computer Society, (2003)Security for Ambient Intelligent Systems., , , и . Ambient Intelligence, Springer, (2005)