From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unintended Certificate Installation into Remote IoT Nodes., , , , и . IMIS, том 994 из Advances in Intelligent Systems and Computing, стр. 845-854. Springer, (2019)Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem., , , , и . INFOCOM Workshops, стр. 980-984. IEEE, (2016)Survey on distributed mobility management schemes for Proxy mobile IPv6., , , , , , и . CCNC, стр. 132-138. IEEE, (2014)A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment., , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 215-221. Springer, (2020)Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network., , и . IMIS, стр. 143-147. IEEE Computer Society, (2012)Analysis of Packet Size on VOIP Performance., , , , , и . International Conference on Internet Computing, стр. 996-1001. CSREA Press, (2002)Study on Signature Verification Process for the Firmware of an Android Platform., , , , и . IMIS, том 773 из Advances in Intelligent Systems and Computing, стр. 540-545. Springer, (2018)Cyber Threats to Industrial Control Systems., , , , и . MIST@CCS, стр. 79-81. ACM, (2015)Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System., , , и . BWCCA, том 186 из Lecture Notes on Data Engineering and Communications Technologies, стр. 302-311. Springer, (2023)Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method., , , и . BWCCA, том 570 из Lecture Notes in Networks and Systems, стр. 215-223. Springer, (2022)