From post

Secure Hierarchical Deterministic Wallet Supporting Stealth Address.

, , , , и . ESORICS (1), том 13554 из Lecture Notes in Computer Science, стр. 89-109. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Prolonged Mobile Phone Use Is Associated with Poor Academic Performance in Adolescents., , , , , и . Cyberpsychology Behav. Soc. Netw., 23 (5): 303-311 (2020)Assessing models of speciation under different biogeographic scenarios; an empirical study using multi-locus and RNA-seq analyses, , , , , , , и . Ecology and Evolution, (2015)Die verbotene Stadt der Nonnen. Geo,   (8): 54-73 (2010)Optimal Robot Scheduling for Web Search Engines, , и . Journal of Scheduling, 1 (1): 15--29 (июня 1998)A public key encryption scheme based on compressed sensing.. ICAIT, стр. 20-24. IEEE, (2017)A Hybrid Method Combining Improved StochSim with SSA for Solving Systems with Multi-State Species., , и . BIOCOMP, стр. 626-631. CSREA Press, (2009)D3DPR: A Direct3D-Based Large-Scale Display Parallel Rendering System Architecture for Clusters., , , и . Asia-Pacific Computer Systems Architecture Conference, том 3740 из Lecture Notes in Computer Science, стр. 540-550. Springer, (2005)Closed-Form Algorithm for 3-D Near-Field OFDM Signal Localization under Uniform Circular Array., , , и . Sensors, 18 (1): 226 (2018)User-Experience-Based Visual Design Study for Carrier Optical Landing-Aid System., , , , , и . HCI (19), том 10919 из Lecture Notes in Computer Science, стр. 200-217. Springer, (2018)Design and Implementation of Hardware Accelerator for Gaussian Filter Based on HLS., , , и . IGTA, том 1043 из Communications in Computer and Information Science, стр. 161-171. Springer, (2019)