From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Erratum to: "Digital signature algorithm for securing digital identities": Information Processing Letters 82 (2002) 247-252.. Inf. Process. Lett., 88 (4): 201-202 (2003)Biometric Authentication for Border Control Applications., и . IEEE Trans. Knowl. Data Eng., 20 (8): 1091-1096 (2008)A comparative study of mobility anchor point selection schemes in hierarchical mobile IPv6 networks., , и . Mobility Management & Wireless Access Protocols, стр. 130-131. ACM, (2004)TCP improvement in multi-radio multi-channel multi-hop networks., , и . CoNEXT, стр. 32. ACM, (2008)Revamping the IEEE 802.11a PHY simulation models., , , и . MSWiM, стр. 28-36. ACM, (2008)Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface, , , , и . CoRR, (2011)Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate., и . HCI (5), том 4554 из Lecture Notes in Computer Science, стр. 428-437. Springer, (2007)On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks., , и . IEEE Access, (2024)A Model for Embedding and Authorizing Digital Signatures in Printed Documents., , , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 465-477. Springer, (2002)New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography., , и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 335-351. Springer, (2005)