From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems., , , , и . Security and Management, стр. 547-553. CSREA Press, (2009)Online Games and Security Issues., , , , и . FGCN (2), стр. 145-148. IEEE Computer Society, (2008)978-0-7695-3431-2.Generating knowledge for the identification of device failure causes and the prediction of the times-to-failure in u-Healthcare environments., , , и . Personal and Ubiquitous Computing, 17 (7): 1383-1394 (2013)A hybrid user authentication protocol for mobile IPTV service., , и . Multimedia Tools Appl., 65 (2): 283-296 (2013)Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard., , , , и . ISPA Workshops, том 4743 из Lecture Notes in Computer Science, стр. 245-254. Springer, (2007)Security Considerations in Cloud Computing Virtualization Environment., и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 208-215. Springer, (2013)Advances in wireless sensor communications and applications for smart space., , , и . Telecommun. Syst., 52 (4): 2321-2323 (2013)Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments., , , , и . IET Commun., 3 (5): 764-771 (2009)A robust and secure time-domain ICI canceller for OFDM based ubiquitous systems in time-varying multipath channels., , , , , и . J. Supercomput., 45 (1): 29-43 (2008)Hybrid Tag Anti-collision Algorithms in RFID Systems., , , и . International Conference on Computational Science (4), том 4490 из Lecture Notes in Computer Science, стр. 693-700. Springer, (2007)