From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension., , , и . ISC, том 5222 из Lecture Notes in Computer Science, стр. 455-470. Springer, (2008)A New Tree-structure-specified Multisignature Scheme for a Document Circulation System., , , , и . SECRYPT, стр. 362-369. SciTePress, (2011)Performance of real-time video transmission using error control over Rayleigh and Rician fading channels., , и . PIMRC, стр. 1061-1065. IEEE, (1998)Improved Subset Difference Method with Ternary Tree., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2034-2044 (2010)Potential wireless technologies in mobile communications., , , , и . ICC, стр. 1121-1125. IEEE, (1999)Augmented Reality (AR) Application Superimposing the Falling Risks of Older Adults in Residential Settings and Coping Strategies: Building an Image-Based Scene Detection Model., , , , , , и . HCI (49), том 14055 из Lecture Notes in Computer Science, стр. 117-124. Springer, (2023)Anonymous Prepaid Content Viewing System with Mobile Terminal., , , , и . SECRYPT, стр. 281-288. INSTICC Press, (2007)Implementation of remote system using touchless palmprint recognition algorithm., , , , и . MoMM, стр. 33-41. ACM, (2010)Side-Channel Analysis of the K2 Stream Cipher., , , , и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 53-73. Springer, (2010)A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework., , , и . Security and Management, стр. 323-329. CSREA Press, (2010)