From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels., и . Wirel. Commun. Mob. Comput., 8 (9): 1227-1232 (2008)An anonymous RFID grouping-proof with missing tag identification., и . IEEE RFID, стр. 146-152. IEEE, (2016)Performance Study of Ant Colony Optimization for Feature Selection in EEG Classification., , , , , , и . BIOMESIP, том 12940 из Lecture Notes in Computer Science, стр. 323-336. Springer, (2021)Security Analysis of Tu and Piramuthu's Protocol., и . NTMS, стр. 1-5. IEEE, (2008)Enhanced Computation of the EEG-IC Polarities using a Genetic Algorithm., , , и . IIAI-AAI, стр. 319-324. IEEE, (2022)Identifying the diffusion source of dementia spreading in structural brain networks., , , , , , и . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, том 11600 из SPIE Proceedings, SPIE, (2021)What can RFID do for Vanets? - A Cryptographic Point of View., , и . SECRYPT, стр. 295-298. SciTePress, (2010)Isosurface Modelling of DatSCAN Images for Parkinson Disease Diagnosis., , , , , и . IWINAC (1), том 11486 из Lecture Notes in Computer Science, стр. 360-368. Springer, (2019)Lightweight Authentication Protocols based on Rotations and the LPN Problem., и . SENSORNETS, стр. 127-134. SciTePress, (2012)Optimal modes of operation of pseudorandom sequence generators based on DLFSRs., , и . Logic Journal of the IGPL, 24 (6): 933-943 (2016)