From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and efficient LBIST for feedback shift register-based cryptographic systems., , и . ETS, стр. 1-6. IEEE, (2014)A Taxonomy Model for Cloud Computing Services., , , , , , и . CLOSER, стр. 56-65. SciTePress, (2011)Error-Correcting Message Authentication for 5G., , , и . MobiMedia, стр. 149-158. ACM, (2016)Protecting IMSI and User Privacy in 5G Networks., , и . MobiMedia, стр. 159-166. ACM, (2016)New Results on the Hardness of Diffie-Hellman Bits., , и . Public Key Cryptography, том 2947 из Lecture Notes in Computer Science, стр. 159-172. Springer, (2004)Classifying Security Threats in Cloud Networking., , , , , и . CLOSER, стр. 214-220. SciTePress, (2015)CRC-Based Message Authentication for 5G Mobile Technology., , и . TrustCom/BigDataSE/ISPA (1), стр. 1186-1191. IEEE, (2015)Conversational IP multimedia security., , , , и . MWCN, стр. 147-151. IEEE, (2002)Mobile health in emerging countries: A survey of research initiatives in Brazil., , , , , , , , , и . Int. J. Medical Informatics, 82 (5): 283-298 (2013)All Bits ax+b mod p are Hard (Extended Abstract).. CRYPTO, том 1109 из Lecture Notes in Computer Science, стр. 114-128. Springer, (1996)