From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extraction of enhanced evoked potentials using wavelet filtering., , , и . Multimedia Tools Appl., 63 (1): 45-61 (2013)Scenario-Based Digital Forensics Challenges in Cloud Computing., , и . Symmetry, 8 (10): 107 (2016)VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity., , и . Information, 5 (4): 526-534 (2014)Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment., , , и . IET Commun., 4 (8): 937-945 (2010)Efficient localization scheme with ring overlapping by utilizing mobile anchors in wireless sensor networks., , , , и . ACM Trans. Embed. Comput. Syst., 12 (2): 20:1-20:18 (2013)Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing., и . CSA/CUTE, том 373 из Lecture Notes in Electrical Engineering, стр. 249-254. Springer, (2015)A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform., , и . Sensors, 16 (7): 1036 (2016)The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone., , , и . ITCS, том 180 из Lecture Notes in Electrical Engineering, стр. 171-178. Springer, (2012)Design and implementation of light-weight mobile multicast for fast MIPv6., , , , и . Comput. Commun., 32 (3): 552-559 (2009)A secure model for controlling the hubs in P2P wireless network based on trust value., , , , , и . Comput. Commun., 33 (8): 997-1004 (2010)