From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An enhanced passivation layer for secure consumer integrated circuit devices., и . GCCE, стр. 300-301. IEEE, (2014)A Privacy Preserving Security Protocol-Based Application for Wireless Communication System., , , и . HPCC/CSS/ICESS, стр. 1651-1656. IEEE, (2015)Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)., , , , и . SESS@ICSE, стр. 50-56. ACM, (2011)Parameter identification for an omni-directional mobile system with distributed mobile actuator module., , , и . MFI, стр. 232-237. IEEE, (2008)CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks., , , , , , , и . Wireless Personal Communications, 89 (2): 479-499 (2016)Analysis and Protection of Computer Network Security Issues., , , и . ICACT, стр. 577-580. IEEE, (2020)APT attack response system through AM-HIDS., , и . ICACT, стр. 271-274. IEEE, (2022)Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication., , и . AINA Workshops, стр. 278-282. IEEE Computer Society, (2015)Trends and research directions for privacy preserving approaches on the cloud., , , и . COMPUTE, стр. 21:1-21:12. ACM, (2013)An Approach to Designing a Network Security-based Application for Communications Safety., , , и . ASONAM, стр. 1002-1009. ACM, (2015)