From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mapping the File Systems Genome: rationales, technique, results and applications., , , и . CoRR, (2013)RFID security and privacy: long-term research or short-term tinkering?, , , , , , и . WISEC, стр. 160. ACM, (2008)Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures., , и . J. Netw. Comput. Appl., (2021)Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions., и . CoRR, (2022)New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies., , , и . CRiSIS, том 12528 из Lecture Notes in Computer Science, стр. 3-27. Springer, (2020)Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations., , и . CNS, стр. 109-117. IEEE, (2022)LLD: A Low Latency Detection Solution to Thwart Cryptocurrency Pump & Dumps., , и . ICBC, стр. 1-9. IEEE, (2023)VISIO: A Visual Approach for Singularity Detection in Recommendation Systems., , , и . TrustBus, том 9264 из Lecture Notes in Computer Science, стр. 33-47. Springer, (2015)Emergent properties: detection of the node-capture attack in mobile wireless sensor networks., , , и . WISEC, стр. 214-219. ACM, (2008)Sensor Networks that Are Provably Resilient., , , , и . SecureComm, стр. 1-10. IEEE, (2006)