From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems., и . HAIS, том 5271 из Lecture Notes in Computer Science, стр. 491-498. Springer, (2008)White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family., , и . WIDECOM, том 27 из Lecture Notes on Data Engineering and Communications Technologies, стр. 153-166. Springer, (2019)Understanding Optimizations and Measuring Performances of PBKDF2., и . WIDECOM, том 27 из Lecture Notes on Data Engineering and Communications Technologies, стр. 101-114. Springer, (2019)Detection and Analysis of Unexpected State Components in Biological Systems., и . CMSB, том 2602 из Lecture Notes in Computer Science, стр. 172. Springer, (2003)Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets., и . ICITST, стр. 1-2. IEEE, (2009)EZK: A Zero Knowledge Tool for Generating, Handling, and Securing Electronic Bills of Lading.. WEBIST (3), стр. 238-241. INSTICC Press, (2007)Differential Fault Attacks against AES Tampering with the Instruction Flow., , и . SECRYPT, стр. 439-444. SciTePress, (2014)Security Analysis of Cryptographic Algorithms: Hints from Machine Learning., , и . EANN, том 2141 из Communications in Computer and Information Science, стр. 569-580. Springer, (2024)What users should know about Full Disk Encryption based on LUKS., и . IACR Cryptology ePrint Archive, (2016)Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers., и . IMIS, том 612 из Advances in Intelligent Systems and Computing, стр. 952-958. Springer, (2017)