From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research availability of devices based on wireless networks., , , и . FRUCT, стр. 27-32. IEEE, (2016)Implementation White Box Cryptography in Substitution-Permutation network., , и . MECO, стр. 1-3. IEEE, (2020)Ensuring data integrity using blockchain technology., , , , и . FRUCT, стр. 534-539. IEEE, (2017)Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network., , , , , , , , , и . WWIC, том 9674 из Lecture Notes in Computer Science, стр. 297-308. Springer, (2016)Implementation White-Box Cryptography for Elliptic Curve Cryptography., , и . MECO, стр. 1-4. IEEE, (2021)Spline-Wavelet Bent Robust Codes., , и . FedCSIS, том 18 из Annals of Computer Science and Information Systems, стр. 227-230. (2019)Formalization of the feature space for detection of attacks on wireless sensor networks., , , и . FRUCT, стр. 526-533. IEEE, (2017)The method of classification of user and system data based on the attributes., , и . FRUCT, стр. 404-409. IEEE, (2016)The method of elf-files identification based on the metric classification algorithms., , , и . FRUCT, стр. 397-403. IEEE, (2016)Dynamic Trust Management Framework for Robotic Multi-Agent Systems., , , , и . NEW2AN, том 9870 из Lecture Notes in Computer Science, стр. 339-348. Springer, (2016)