From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications., , и . Wirel. Pers. Commun., 86 (3): 1593-1610 (2016)Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services., , , , , , и . Sensors, 20 (16): 4651 (2020)CMAR: Accurate and Efficient Classification Based on Multiple Class-Association Rules., , и . ICDM, стр. 369-376. IEEE Computer Society, (2001)Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding., , , , и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 205-221. Springer, (2001)Digital filter design using root moments for sum-of-all-pass structures from complete and partial specifications., и . IEEE Trans. Signal Process., 54 (1): 315-324 (2006)Depth and Breadth of Pie Menus for Mid-air Gesture Interaction., , , , , и . Int. J. Hum. Comput. Interact., 37 (2): 131-140 (2021)Personality Affects Dispositional Trust and History-Based Trust in Different Ways., , , , , и . Int. J. Hum. Comput. Interact., 39 (4): 949-960 (февраля 2023)KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network., , , , и . Soft Comput., 24 (2): 965-980 (2020)KRTunnel: DNS channel detector for mobile devices., , , , и . Comput. Secur., (2022)Cryptanalysis of enhancement on "quantum blind signature based on two-state vector formalism"., и . Quantum Inf. Process., 13 (5): 1245-1254 (2014)