From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A scalable sampling scheme for clustering in network traffic analysis., , и . Infoscale, том 304 из ACM International Conference Proceeding Series, стр. 38. ACM, (2007)Path-Balanced Logic Design to Realize Block Ciphers Resistant to Power and Timing Attacks., , и . IEEE Trans. Very Large Scale Integr. Syst., 27 (5): 1080-1092 (2019)On the construction of binary sequence families with low correlation and large sizes., , и . ISIT, стр. 1253-1257. IEEE, (2010)Optimal spectrally-constrained sequences., , , и . ISIT, стр. 2692-2696. IEEE, (2015)Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem., , и . Cryptogr. Commun., 17 (1): 15-25 (января 2025)A Symbol-Pair Decoder for CSS Codes., , и . CoRR, (2024)Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers., и . Cryptogr. Commun., 13 (5): 847-864 (2021)A New Class of Ternary Cocyclic Hadamard Codes., и . Appl. Algebra Eng. Commun. Comput., 14 (1): 65-73 (2003)Re-engineering simultaneous internet sessions process-separated browsers., , и . ACSW, стр. 70:1-70:10. ACM, (2017)Designing Information Systems Which Manage or Avoid Privacy Incidents., , и . EuroISI, том 5376 из Lecture Notes in Computer Science, стр. 131-142. Springer, (2008)