From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques., и . Inf. Process. Lett., (2017)Evaluation of password encrypted key exchange authentication techniques: design approach perspective: evaluation of PAKE protocol., , , и . IML, стр. 16:1-16:9. ACM, (2017)Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography., , и . Secur. Commun. Networks, 9 (16): 3105-3115 (2016)Design of Blockchain-based Secure Electric Vehicle Charging System Using ECC., , и . CITS, стр. 1-5. IEEE, (2022)Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability., , и . Comput. Commun., (2023)Ransomware Attack Protection: A Cryptographic Approach., , , , , и . SpaCCS, том 11611 из Lecture Notes in Computer Science, стр. 15-25. Springer, (2019)Medical Image Segmentation using LeViT-UNet++: A Case Study on GI Tract Data., и . CoRR, (2022)Cross-modal hybrid architectures for gastrointestinal tract image analysis: A systematic review and futuristic applications., , , , , и . Image Vis. Comput., (2024)Design of RSA processor for concurrent cryptographic transformations., , , и . Microelectron. J., (2017)Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities., , , и . Comput. Electr. Eng., (2020)