From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (1): 67-76 (2022)On minimizing end-to-end delay with optimal traffic partitioning., , и . IEEE Trans. Veh. Technol., 55 (2): 681-690 (2006)On the Limitation of Embedding Cryptographic Signature for Primary Transmitter Authentication., , , , и . IEEE Wirel. Commun. Lett., 1 (4): 324-327 (2012)Adaptive QoS control for real-time video communication over wireless channels., , , , и . Int. J. Ad Hoc Ubiquitous Comput., 1 (1/2): 27-37 (2005)mCore: Achieving Sub-millisecond Scheduling for 5G MU-MIMO Systems., , , и . INFOCOM, стр. 1-10. IEEE, (2021)Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication., , , , и . ACSAC, стр. 681-693. ACM, (2020)Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation., , , , , и . MobiHoc, стр. 71-80. ACM, (2019)Age of Critical Information: Optimizing Data Freshness Based on Content Criticality., , , , и . MILCOM, стр. 747-754. IEEE, (2023)Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain., , , и . INFOCOM, стр. 1648-1657. IEEE, (2020)MobTrack: Locating indoor interfering radios with a single device., , , и . INFOCOM, стр. 1-9. IEEE, (2016)