Author of the publication

Development of the Edge Computing Platform with Dynamic Modular Configuration for an IoT Platform.

, , , , and . PACRIM, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Output Prediction Attacks on Block Ciphers Using Deep Learning., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 248-276. Springer, (2022)Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC., , , and . CANDAR (Workshops), page 320-325. IEEE, (2021)A Generic Construction of Integrated Secure-Channel Free PEKS and PKE., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 69-86. Springer, (2018)Detecting Fake QR Codes Using Information from Error-Correction., , , , , , , , , and 2 other author(s). J. Inf. Process., (2021)Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations., , , and . Comput. J., 62 (4): 614-630 (2019)FMS Attack-Resistant WEP Implementation Is Still Broken., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 17-26. Springer, (2005)Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers., , and . CANDAR Workshops, page 333-338. IEEE, (2019)Verifiable Functional Encryption using Intel SGX., , , and . IACR Cryptol. ePrint Arch., (2020)Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 164-171 (2010)Expanding Weak-key Space of RC4., , , and . J. Inf. Process., 22 (2): 357-365 (2014)