Author of the publication

Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices.

, , , and . MSN, page 334-340. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 453-458. Springer, (2013)A Pipeline Optimization Model for QKD Post-processing System., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 472-481. Springer, (2014)First Request First Service Entanglement Routing Scheme for Quantum Networks., , , , , , and . Entropy, 24 (10): 1404 (2022)An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. Univers. Comput. Sci., 19 (16): 2420-2436 (2013)Directing orbits of chaotic systems by particle swarm optimization, , , , and . Chaos, Solitons & Fractals, 29 (2): 454--461 (July 2006)Collective motion of a class of social foraging swarms, , , and . Chaos, Solitons & Fractals, 38 (1): 277--292 (October 2008)An Efficient Approach for Outlier Detection with Imperfect Data Labels., , , , and . IEEE Trans. Knowl. Data Eng., 26 (7): 1602-1616 (2014)Engineering Link Utilization in Cellular Offloading Oriented VANETs., , , , and . GLOBECOM, page 1-6. IEEE, (2015)An improved congestion control algorithm based on social awareness in Delay Tolerant Networks., , , and . ICC, page 1773-1777. IEEE, (2014)