From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Journeys in non-classical computation II: initial journeys and waypoints, , , , , , , , , и 2 other автор(ы). The International Journal of Parralel, Emergent and Distributed Systems, 21 (2): 97--125 (апреля 2005)Human competitive security protocols synthesis., , и . GECCO, стр. 1855-1856. ACM, (2006)Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions., , и . FSE, том 3017 из Lecture Notes in Computer Science, стр. 161-177. Springer, (2004)Evolving Quantum Circuits and Programs Through Genetic Programming., , и . GECCO (2), том 3103 из Lecture Notes in Computer Science, стр. 569-580. Springer, (2004)Using automated search to generate test data for matlab., , и . GECCO, стр. 1697-1704. ACM, (2009)Two-Stage Optimisation in the Design of Boolean Functions., и . ACISP, том 1841 из Lecture Notes in Computer Science, стр. 242-254. Springer, (2000)Continuous User Authentication for Human-Robot Collaboration., , и . ARES, стр. 115:1-115:9. ACM, (2021)Heuristic search for non-linear cryptanalytic approximations., , и . IEEE Congress on Evolutionary Computation, стр. 3561-3568. IEEE, (2007)Risk profiles and distributed risk assessment., , и . Comput. Secur., 28 (7): 521-535 (2009)Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia., , и . HCI (35), том 14045 из Lecture Notes in Computer Science, стр. 247-261. Springer, (2023)