From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyber Security Concerns in Social Networking Service., , , и . Int. J. Commun. Networks Inf. Secur., (2020)Smartening the Environment using Wireless Sensor Networks in a Developing Country, , и . CoRR, (2007)Protection of Integrity and Ownership of PDF Documents Using Invisible Signature., , , и . UKSim, стр. 533-537. IEEE Computer Society, (2012)On the Key Revocation Schemes in Wireless Sensor Networks., , и . GreenCom/iThings/CPScom, стр. 290-297. IEEE, (2013)Security Management in Wireless Sensor Networks with a Public Key Based Scheme., , , и . APNOMS, том 4773 из Lecture Notes in Computer Science, стр. 503-506. Springer, (2007)PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA., , , и . ICNC, стр. 815-819. IEEE Computer Society, (2012)NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks., , , , и . Int. Arab J. Inf. Technol., 5 (1): 102-107 (2008)Information integrity in smart grid systems., , , , и . Inf. Syst., (2015)The Green Internet of Things (G-IoT)., , , , и . Wirel. Commun. Mob. Comput., (2019)A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards., и . IEICE Trans. Inf. Syst., 90-D (11): 1885-1888 (2007)