From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Heuristic State Space Search Model for Security Protocol Verification., , и . ICETE (2), стр. 113-118. INSTICC Press, (2004)Performance Modeling of Spatio-Temporal Algorithms Over GEDS Framework., и . Int. J. Grid High Perform. Comput., 4 (3): 63-84 (2012)An IV Collision Avoidance Algorithm - Strengthening the WEP., , и . ICWN, стр. 73-78. CSREA Press, (2005)Enhancing QoS in 802.11e with Beacon Management., , , и . HSNMC, том 3079 из Lecture Notes in Computer Science, стр. 598-608. Springer, (2004)Simulation of Lung Respiration Function Using Soft Body Model., , и . EMS, стр. 102-107. IEEE Computer Society, (2010)Soft Body Simulation with Leaking Effect., и . Asia International Conference on Modelling and Simulation, стр. 390-395. IEEE Computer Society, (2008)Formal Verification of 802.11i using Strand Space Formalism., , и . ICN/ICONS/MCL, стр. 140. IEEE Computer Society, (2006)Designing Authentication Protocols: Trends and Issues., , и . ICN/ICONS/MCL, стр. 76. IEEE Computer Society, (2006)A Scalable Technique for Large Scale, Real-Time Range Monitoring of Heterogeneous Clients., , и . TRIDENTCOM, стр. 1-6. IEEE, (2007)Optimal strategies in MAC protocols., и . ICC, стр. 1907-1911. IEEE, (2004)