From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Password typos resilience in honey encryption., , и . ICOIN, стр. 593-598. IEEE, (2017)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , и . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)Cache Side-Channel Attack on Mail User Agent., , , и . ICOIN, стр. 236-238. IEEE, (2020)Revisiting Secure Multi-Server Oblivious RAMs., , , , и . ICOIN, стр. 469-472. IEEE, (2024)Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communications., , , , , , , , и . ICOIN, стр. 64-69. IEEE Computer Society, (2014)A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , и . FGIT-FGCN, том 56 из Communications in Computer and Information Science, стр. 405-412. Springer, (2009)Analysis of NTP pool monitoring system based on multiple monitoring stations., , и . MobiHoc, стр. 259-264. ACM, (2022)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , и . WASA, том 8491 из Lecture Notes in Computer Science, стр. 267-278. Springer, (2014)A Survey on Security Threats in Blockchain-based Internet of Things Systems., и . ICTC, стр. 2134-2138. IEEE, (2022)A Comparative Analysis of Searchable Encryption Schemes using SGX., и . ICTC, стр. 526-528. IEEE, (2020)