From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels., и . Wirel. Commun. Mob. Comput., 8 (9): 1227-1232 (2008)Performance Study of Ant Colony Optimization for Feature Selection in EEG Classification., , , , , , и . BIOMESIP, том 12940 из Lecture Notes in Computer Science, стр. 323-336. Springer, (2021)An anonymous RFID grouping-proof with missing tag identification., и . IEEE RFID, стр. 146-152. IEEE, (2016)Security Analysis of Tu and Piramuthu's Protocol., и . NTMS, стр. 1-5. IEEE, (2008)Enhanced Computation of the EEG-IC Polarities using a Genetic Algorithm., , , и . IIAI-AAI, стр. 319-324. IEEE, (2022)Identifying the diffusion source of dementia spreading in structural brain networks., , , , , , и . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, том 11600 из SPIE Proceedings, SPIE, (2021)What can RFID do for Vanets? - A Cryptographic Point of View., , и . SECRYPT, стр. 295-298. SciTePress, (2010)Isosurface Modelling of DatSCAN Images for Parkinson Disease Diagnosis., , , , , и . IWINAC (1), том 11486 из Lecture Notes in Computer Science, стр. 360-368. Springer, (2019)Secure EPC Gen2 Compliant Radio Frequency Identification., , , и . ADHOC-NOW, том 5793 из Lecture Notes in Computer Science, стр. 227-240. Springer, (2009)Tag Memory-Erasure Tradeoff of RFID Grouping Codes., и . IEEE Commun. Lett., 20 (6): 1144-1147 (2016)