From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Pancyclic Claw-Free Graphs.. Ars Comb., (1998)Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks., , , и . IJDSN, (2012)(t, n) Threshold secret image sharing scheme with adversary structure., , , , и . Multim. Tools Appl., 76 (20): 21193-21210 (2017)Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks., , , и . Comput. Networks, (января 2024)Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving., , , , , и . Appl. Math. Comput., (2020)A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information., , , и . Int. Trans. Oper. Res., 28 (4): 1864-1889 (2021)An encoding method for both image compression and data lossless information hiding., , , и . J. Syst. Softw., 83 (11): 2073-2082 (2010)Hamiltonian cycles in regular 3-connected claw-free graphs.. Discret. Math., 156 (1-3): 171-196 (1996)LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage., , , , и . ITNG, стр. 174-178. IEEE Computer Society, (2015)A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise., , , и . FNC/MobiSPC, том 134 из Procedia Computer Science, стр. 212-218. Elsevier, (2018)