From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing transmissions between nodes of WSN using TPM., и . FedCSIS, том 5 из Annals of Computer Science and Information Systems, стр. 1059-1068. IEEE, (2015)Security Domain for the Sensor Nodes with Strong Authentication., , и . ICMCIS, стр. 1-6. IEEE, (2019)Secure protocol for wireless communication within internet of military things., , и . WF-IoT, стр. 508-513. IEEE Computer Society, (2015)An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT., , и . Security and Fault Tolerance in Internet of Things, Springer, (2019)The method of secure data exchange using Flash RAM media., и . FedCSIS, стр. 621-625. (2012)Fault-tolerant techniques for the Internet of Military Things., , и . WF-IoT, стр. 496-501. IEEE Computer Society, (2015)The Method of Determining the Optimal Communication Structure., и . CN, том 860 из Communications in Computer and Information Science, стр. 3-12. Springer, (2018)The concept of authentication in WSNs using TPM., и . FedCSIS (Position Papers), том 3 из Annals of Computer Science and Information Systems, стр. 183-190. (2014)On Some Resources Placement Schemes in the 4-Dimensional Soft Degradable Hypercube Processors Network., и . DepCoS-RELCOMEX, том 286 из Advances in Intelligent Systems and Computing, стр. 133-143. Springer, (2014)Procedures for sensor nodes operation in the secured domain., , и . Concurr. Comput. Pract. Exp., (2020)