From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of classification algorithms for intrusion detection in MANETs., , , и . Knowl. Based Syst., (2012)A True Random Number Generator Based on Gait Data for the Internet of You., , , и . IEEE Access, (2020)A New TRNG Based on Coherent Sampling With Self-Timed Rings., , , и . IEEE Trans. Ind. Informatics, 12 (1): 91-100 (2016)LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification., , , и . Comput. Stand. Interfaces, 31 (1): 88-97 (2009)Weaknesses of fingerprint-based mutual authentication protocol., , , и . Secur. Commun. Networks, 8 (12): 2124-2134 (2015)On the traceability of tags in SUAP RFID authentication protocols., , , и . RFID-TA, стр. 292-296. IEEE, (2012)PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things., , , , и . J. Netw. Comput. Appl., (2016)Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals., , , и . Entropy, 20 (2): 94 (2018)Weaknesses in another Gen2-based RFID authentication protocol., , , , и . RFID-TA, стр. 80-84. IEEE, (2012)Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol., , , и . RFIDSec, том 6370 из Lecture Notes in Computer Science, стр. 22-34. Springer, (2010)