From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol., и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 302-311. Springer, (2006)An efficient locking and unlocking method of sequential systems., , , и . RACS, стр. 428-433. ACM, (2012)FSM watermarks based on ordering of flip flops., , и . RACS, стр. 258-262. ACM, (2014)A unified design method utilizing decomposability and composability for secure systems., , , и . RACS, стр. 272-276. ACM, (2011)End-to-End Optimization in Heterogeneous Distributed Real-Time Systems.. LCTES, том 1474 из Lecture Notes in Computer Science, стр. 235-249. Springer, (1998)Power Surge and Clock Hiccup Side-Channel Watermarking Approach for Finite State Machines., и . CCWC, стр. 922-928. IEEE, (2019)Cloud-based user authentication with geo-temporal queries on smartphones., , и . SCC@ASIACCS, стр. 19-26. ACM, (2014)Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks., , , и . Secur. Commun. Networks, 8 (7): 1169-1178 (2015)Scheduling of Real-Time Tasks with Complex Constraints., и . Performance Evaluation, том 1769 из Lecture Notes in Computer Science, стр. 253-282. Springer, (2000)Designing a two-level monitoring method to detect network abnormal behaviors., , и . IRI, стр. 703-709. IEEE Computer Society, (2014)