From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A hybrid user authentication protocol for mobile IPTV service., , и . Multimedia Tools Appl., 65 (2): 283-296 (2013)Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard., , , , и . ISPA Workshops, том 4743 из Lecture Notes in Computer Science, стр. 245-254. Springer, (2007)Efficient Algorithms for Two-Center Problems for a Convex Polygon., и . COCOON, том 1858 из Lecture Notes in Computer Science, стр. 299-309. Springer, (2000)Hybrid Tag Anti-collision Algorithms in RFID Systems., , , и . International Conference on Computational Science (4), том 4490 из Lecture Notes in Computer Science, стр. 693-700. Springer, (2007)An auxiliary recommendation system for repetitively purchasing items in E-commerce., и . BigComp, стр. 96-98. IEEE Computer Society, (2014)An Enhanced Anti-collision Algorithm for EPC Gen2 RFID System., и . MUE, стр. 293-296. IEEE Computer Society, (2011)Logarithmic Width, Linear Area Upward Drawing of AVL Trees.. Inf. Process. Lett., 63 (6): 303-307 (1997)Protecting Your Privacy with a Mobile Agent Device in RFID Environment., , , , , , и . Wireless Personal Communications, 51 (1): 165-178 (2009)A Parallel Algorithm for Path-Min Queries in Trees.. ICCI, том 468 из Lecture Notes in Computer Science, стр. 425-432. Springer, (1990)Area-Efficient Algorithms for Upward Straight-Line Tree Drawings (Extended Abstract)., , и . COCOON, том 1090 из Lecture Notes in Computer Science, стр. 106-116. Springer, (1996)