From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks., , , , и . ISCC, стр. 975-981. IEEE Computer Society, (2013)Avoiding Local Optima in Single Particle Reconstruction., , и . RECOMB, том 3500 из Lecture Notes in Computer Science, стр. 118-132. Springer, (2005)On a modal lambda calculus for S4., и . MFPS, том 1 из Electronic Notes in Theoretical Computer Science, стр. 515-534. Elsevier, (1995)Defending Code from the Internet of Things against Buffer Overflow., , , , , , и . SBRC, стр. 293-301. IEEE Computer Society, (2014)End-to-end authentication in Under-Water Sensor Networks., , , , , и . ISCC, стр. 299-304. IEEE Computer Society, (2013)SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks., , , , и . NCA, стр. 145-154. IEEE Computer Society, (2006)NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks., , и . ICCCN, стр. 803-808. IEEE, (2007)SecLEACH - On the security of clustered sensor networks., , , , , , и . Signal Process., 87 (12): 2882-2895 (2007)ACBuilder: A tool for hardware architecture security evaluation., , , , и . HOST, стр. 97-102. IEEE Computer Society, (2016)WISENEP: A Network Processor for Wireless Sensor Networks., , , , , , , и . ISCC, стр. 8-14. IEEE Computer Society, (2006)