From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive initialization algorithm for ad hoc radio networks with carrier sensing., , и . Theor. Comput. Sci., 402 (1): 16-28 (2008)Approximate Counters for Flash Memory., и . RTCSA (1), стр. 185-189. IEEE Computer Society, (2011)Protecting Electronic Signatures in Case of Key Leakage., , , , , и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 252-274. Springer, (2016)Fair Mutual Authentication., , и . SECRYPT, стр. 754-759. SCITEPRESS, (2021)Anonymity and k-Choice Identities., и . Inscrypt, том 4990 из Lecture Notes in Computer Science, стр. 283-297. Springer, (2007)Revised Gateway Selection for LoRa Radio Networks., , , и . ADHOC-NOW, том 11803 из Lecture Notes in Computer Science, стр. 228-240. Springer, (2019)On Optimal One-dimensional Routing Strategies in Sensor Networks., , и . BroadBandCom, стр. 209-214. Wrocław University of Technology, (2009)Privacy Protection for RFID with Hidden Subset Identifiers., , и . Pervasive, том 5013 из Lecture Notes in Computer Science, стр. 298-314. Springer, (2008)Node Evaluation in the Chord P2P Systems., , и . DepCoS-RELCOMEX, стр. 168-175. IEEE Computer Society, (2009)Privacy Protection in Dynamic Systems Based on RFID Tags., , и . PerCom Workshops, стр. 235-240. IEEE Computer Society, (2007)