From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks., , , , и . ICPP Workshops, стр. 397-. IEEE Computer Society, (2003)A Reliable Key Authentication Schema for Secure Multicast Communications., , и . SRDS, стр. 231-240. IEEE Computer Society, (2003)Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions., , и . SRDS, стр. 213-218. IEEE Computer Society, (2012)POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks., , , и . SRDS, стр. 185-194. IEEE Computer Society, (2008)A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions., , и . ICMB, стр. 28-34. IEEE Computer Society, (2005)HyBIS: Advanced Introspection for Effective Windows Guest Protection., , и . SEC, том 502 из IFIP Advances in Information and Communication Technology, стр. 189-204. Springer, (2017)Logical key hierarchy for groups management in Distributed Online Social Network., , , и . ISCC, стр. 710-717. IEEE Computer Society, (2016)Events privacy in WSNs: A new model and its application., , , и . WOWMOM, стр. 1-9. IEEE Computer Society, (2011)Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks., и . WOWMOM, стр. 1-6. IEEE Computer Society, (2013)GPU Algorithms for K-Anonymity in Microdata., , , и . CNS, стр. 1-9. IEEE, (2019)