From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Construction of efficient and secure pairing algorithm and its application., , и . J. Commun. Networks, 10 (4): 437-443 (2008)Construction of Efficient and Secure Pairing Algorithm and its Application., , и . IACR Cryptol. ePrint Arch., (2007)Low-Power Encryption Algorithm Block Cipher in JavaScript., и . J. Inform. and Commun. Convergence Engineering, 12 (4): 252-256 (2014)ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization., , , , , и . CCSW, стр. 165. ACM, (2020)An enhanced LBS security protocol in wireless networks., , , и . IGARSS, стр. 1594-1597. IEEE, (2005)Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA., , и . FDSE, том 8860 из Lecture Notes in Computer Science, стр. 191-203. Springer, (2014)Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON., , , и . ICUFN, стр. 703-707. IEEE, (2018)Optimization of CHAM Encryption Algorithm Based on Javascript., , , и . ICUFN, стр. 774-778. IEEE, (2018)A Survivability Model for Cluster System Under DoS Attacks., , , , и . HPCC, том 3726 из Lecture Notes in Computer Science, стр. 567-572. Springer, (2005)Parallel Implementations of CHAM., , , , , и . WISA, том 11402 из Lecture Notes in Computer Science, стр. 93-104. Springer, (2018)