From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Model for Evaluating Connectivity Availability in Random Sleep Scheduled Delay-Tolerant Wireless Networks., , , и . GLOBECOM, стр. 1-5. IEEE, (2010)Experimental Analysis of an RFID Security Protocol., , , , , , и . ICEBE, стр. 62-70. IEEE Computer Society, (2006)SOA-Trust: Towards Developing Trustworthy RFID Enabled Intelligent Service Solutions., , и . ICEBE, стр. 751-754. IEEE Computer Society, (2007)Quality Management using RFID and Third Generation Mobile Communications Systems., , , и . ICEBE, стр. 504-510. IEEE Computer Society, (2006)Warehouse Financing Risk Analysis for SMEs in China., , , , и . ICSS, стр. 43-48. IEEE Computer Society, (2010)Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 Scheme., , и . ICYCS, стр. 1583-1588. IEEE Computer Society, (2008)PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 Standards., , и . ICEBE, стр. 289-296. IEEE Computer Society, (2008)RFID Assisted Object Tracking for Automating Manufacturing Assembly Lines., , , и . ICEBE, стр. 48-53. IEEE Computer Society, (2007)A P2P Collaborative RFID Data Cleaning Model., , , , и . GPC Workshops, стр. 304-309. IEEE Computer Society, (2008)Supply Chain Carbon Impact Analysis: A SCOR Based Input-Output Model Approach., , и . ICEBE, стр. 399-404. IEEE Computer Society, (2010)