From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Two-Party ECDSA Scheme for Cryptocurrencies., , , и . ICISS, том 14424 из Lecture Notes in Computer Science, стр. 411-430. Springer, (2023)EdgeNet for efficient scene graph classification., , , , и . IJCNN, стр. 1-8. IEEE, (2022)Resilience to Denial-of-Service and Integrity Attacks: A Structured Systems Approach., , , , и . CoRR, (2021)Monotonic Signed Graph approach for cross-layer congestion control in wireless ad-hoc networks., , и . GLOBECOM Workshops, стр. 309-314. IEEE, (2011)Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture., , , , , , и . AINA Workshops, стр. 373-380. IEEE Computer Society, (2016)PrivFlow: Secure and Privacy Preserving Serverless Workflows on Cloud., , , , и . CCGrid, стр. 447-458. IEEE, (2023)Structural resilience of cyberphysical systems under attack., , и . ACC, стр. 283-289. IEEE, (2016)ProFace: A Cancelable Face Template Protection Approach., , , и . COMSNETS, стр. 147-152. IEEE, (2023)Smart Contract Fuzzing for Enterprises: The Language Agnostic Way., , , , , и . COMSNETS, стр. 1-6. IEEE, (2022)A graph theory based generic risk assessment framework for internet of things (IoT)., , и . ANTS, стр. 1-6. IEEE, (2017)