From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deterministic Analysis of Balancedness in Symmetric Cryptography., и . ISCIS, том 4263 из Lecture Notes in Computer Science, стр. 1011-1020. Springer, (2006)Algorithm for Proving the Knowledge of an Independent Vertex Set., и . EUROCAST, том 3643 из Lecture Notes in Computer Science, стр. 346-354. Springer, (2005)Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)., , , и . CompSysTech, стр. 56. ACM, (2009)Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks., , и . WOSIS, стр. 103-110. INSTICC Press, (2009)Fuzzy-based forest fire prevention and detection by wireless sensor networks., , , , , и . CoRR, (2022)Secure ambient intelligence prototype for airports., , , , и . CoRR, (2022)The teaching of cryptologic mathematics., , и . CompSysTech, стр. 580-584. ACM, (2003)Research on smart-locks cybersecurity and vulnerabilities., , , и . Wirel. Networks, 30 (6): 5905-5917 (августа 2024)Differentiated Services to Provide Efficient Node Authentication in VANETs., , и . Security and Management, стр. 184-187. CSREA Press, (2009)FastTriaje: A Mobile System for Victim Classification in Emergency Situations., , , и . WEBIST (1), стр. 238-242. SciTePress, (2014)