From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhanced centroid localization of wireless sensor nodes using linear and neighbor weighting mechanisms., , , и . IMCOM, стр. 43:1-43:8. ACM, (2015)ChirpKey: A Chirp-level Information-based Key Generation Scheme for LoRa Networks via Perturbed Compressed Sensing., , , , , , , и . INFOCOM, стр. 1-10. IEEE, (2023)Rapid prototyping of a wireless sensor network gateway for the internet of things using off-the-shelf components., , и . ICIT, стр. 1926-1931. IEEE, (2015)Modulating a noisy carrier signal for eavesdropping-resistant HF RFID.. Elektrotech. Informationstechnik, 124 (11): 404-408 (2007)Attacking smart card systems: Theory and practice., , , , и . Inf. Secur. Tech. Rep., 14 (2): 46-56 (2009)A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement., , , и . IEEE Trans. Ind. Informatics, 16 (1): 691-702 (2020)Detecting Parkinson's diseases via the characteristics of the intrinsic mode functions of filtered electromyograms., , , , , , , , и . INDIN, стр. 1484-1487. IEEE, (2015)An Efficient Method for Finding Square Roots for Elliptic Curves over OEF., и . FCS, стр. 87-91. CSREA Press, (2009)Multimodal biometric authentication in wireless sensor networks., , , и . INDIN, стр. 1003-1007. IEEE, (2016)ns-2 extension to simulate localization system in wireless sensor networks., и . AFRICON, стр. 1-7. IEEE, (2011)