From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism., , и . MUE/FutureTech, том 448 из Lecture Notes in Electrical Engineering, стр. 573-579. (2017)Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism., , , , и . ICOIN, том 3090 из Lecture Notes in Computer Science, стр. 915-924. Springer, (2004)XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing., , , , и . ICCSA (5), том 3984 из Lecture Notes in Computer Science, стр. 251-259. Springer, (2006)Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network., , и . ICIC (3), том 2 из Communications in Computer and Information Science, стр. 1110-1118. Springer, (2007)An enhanced LBS security protocol in wireless networks., , , и . IGARSS, стр. 1594-1597. IEEE, (2005)Efficient Exponentiation in GF(pm) Using the Frobenius Map., , , и . ICCSA (4), том 3983 из Lecture Notes in Computer Science, стр. 584-593. Springer, (2006)XML-Based Digital Signature Accelerator in Open Mobile Grid Computing., , , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 323-333. Springer, (2005)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , и . ISPA Workshops, том 3759 из Lecture Notes in Computer Science, стр. 609-618. Springer, (2005)Forensics for Korean cell phone., , и . e-Forensics, стр. 30. ICST/ACM, (2008)A DPA Countermeasure by Randomized Frobenius Decomposition., , , и . WISA, том 3786 из Lecture Notes in Computer Science, стр. 271-282. Springer, (2005)