From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps., , , , , и . WISEC, стр. 25:1-25:12. ACM, (2015)Dynamic Software Birthmark for Java Based on Heap Memory Analysis., , и . Communications and Multimedia Security, том 7025 из Lecture Notes in Computer Science, стр. 94-107. Springer, (2011)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , и 11 other автор(ы). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)UFLE: a user-friendly location-free encryption system for mobile users., , , и . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking., , , и . Security and Management, стр. 179-183. CSREA Press, (2009)Unsuccessful Search in Self-Adjusting Data Structures., и . J. Algorithms, 15 (3): 447-481 (1993)A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities., , , , и . Pervasive Mob. Comput., (2017)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , и . Quantum Inf. Process., 13 (6): 1425-1435 (2014)MLAS: multiple level authentication scheme for VANETs., , , и . AsiaCCS, стр. 471-475. ACM, (2011)Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity., , , и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 352-369. Springer, (2003)