From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family., , и . WIDECOM, том 27 из Lecture Notes on Data Engineering and Communications Technologies, стр. 153-166. Springer, (2019)Understanding Optimizations and Measuring Performances of PBKDF2., и . WIDECOM, том 27 из Lecture Notes on Data Engineering and Communications Technologies, стр. 101-114. Springer, (2019)A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems., и . HAIS, том 5271 из Lecture Notes in Computer Science, стр. 491-498. Springer, (2008)Detection and Analysis of Unexpected State Components in Biological Systems., и . CMSB, том 2602 из Lecture Notes in Computer Science, стр. 172. Springer, (2003)Measuring Performances of a White-Box Approach in the IoT Context., , , , , и . Symmetry, 11 (8): 1000 (2019)Effects of central tendency measures on term weighting in textual information retrieval., , и . Soft Comput., 25 (11): 7341-7378 (2021)Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives., , , , , , , и . IACR Cryptol. ePrint Arch., (2024)EZK: A Zero Knowledge Tool for Generating, Handling, and Securing Electronic Bills of Lading.. WEBIST (3), стр. 238-241. INSTICC Press, (2007)Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets., и . ICITST, стр. 1-2. IEEE, (2009)Differential Fault Attacks against AES Tampering with the Instruction Flow., , и . SECRYPT, стр. 439-444. SciTePress, (2014)