From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks., , и . J. Networks, 7 (2): 267-274 (2012)On the application of digital forensics in different scenarios., , , , и . SADFE, стр. 1-5. IEEE, (2013)Dynamic trust evaluation in open networks., , , , , , и . Intell. Autom. Soft Comput., 22 (4): 631-638 (2016)Improving Efficiency of Passive RFID Tag Anti-Collision Protocol Using Dynamic Frame Adjustment and Optimal Splitting., , , и . Sensors, 18 (4): 1185 (2018)Outsourced Attribute-Based Encryption Scheme Based on Semantic Technology in Fog Computing., и . ICCEIC, стр. 20-23. IEEE, (2023)Key Management in Sensor Networks., , и . WASA, том 4138 из Lecture Notes in Computer Science, стр. 457-466. Springer, (2006)Key Predistribution in Sensor Networks., , и . UIC, том 4159 из Lecture Notes in Computer Science, стр. 845-853. Springer, (2006)A Hexagon-Based Key Predistribution Scheme in Sensor Networks., , и . ICPP Workshops, стр. 175-180. IEEE Computer Society, (2006)Efficient Group Key Management Scheme in Wireless Sensor Networks., , и . IITSI, стр. 411-415. IEEE Computer Society, (2010)On Available Bandwidth Measurement Implementation and Experiment.. LCN, стр. 772-773. IEEE Computer Society, (2004)