From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A cooperative jamming protocol for physical layer security in wireless networks., , , и . ICASSP, стр. 5803-5807. IEEE, (2015)New Constructions of Low-Complexity Convolutional Codes., , и . ICC, стр. 1-6. IEEE, (2009)Secure encoder designs based on turbo codes., , и . ICC, стр. 4315-4320. IEEE, (2015)Secretly Pruned Convolutional Codes: Security Analysis and Performance Results., , и . IEEE Trans. Inf. Forensics Secur., 11 (7): 1500-1514 (2016)Terahertz Technologies to Deliver Optical Network Quality of Experience in Wireless Systems Beyond 5G., , , , , , , , , и 4 other автор(ы). IEEE Communications Magazine, 56 (6): 144-151 (2018)Cooperation for secure wireless communications with resource-bounded eavesdroppers., , , и . GLOBECOM Workshops, стр. 1379-1384. IEEE, (2014)Short paper: attacking and defending lightweight PHY security schemes for wireless communications., , и . WISEC, стр. 177-182. ACM, (2014)Physical layer security via secret trellis pruning., , и . PIMRC, стр. 507-512. IEEE, (2013)Τεχνικές κωδικοποίησης καναλιού με έμφαση στους συγκεραστικούς και στους τούρμπο κώδικες. National and Kapodistrian University of Athens, Greece, (2012)National Archive of PhD Theses: oai:10442/35282.Recursive flexible convolutional encoders for parallel concatenation., , и . ISTC, стр. 250-254. IEEE, (2012)