From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Protect Personal Information against Keyloggers., , и . IMSA, стр. 275-280. IASTED/ACTA Press, (2005)Embedding Digital Signatures in MP3s., , и . IMSA, стр. 271-274. IASTED/ACTA Press, (2005)An Intrusion Detection System for Mobile Ad-Hoc Networks.. Security and Management, стр. 285-290. CSREA Press, (2009)Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.. FCS, стр. 256-259. CSREA Press, (2008)Near-linear wirelength estimation for FPGA placement., , , , и . CCECE, стр. 1198-1203. IEEE, (2009)An Approximate Solution for Steiner Trees in Multicast Routing., , и . IC-AI, стр. 707-711. CSREA Press, (2004)BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain., , , , и . IACR Cryptol. ePrint Arch., (2020)Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset., и . CSER, том 8 из Procedia Computer Science, стр. 333-337. Elsevier, (2012)An improved differential privacy algorithm to protect re-identification of data., , и . IHTC, стр. 133-138. IEEE, (2017)Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization., , , , и . IEEE Internet Things J., 9 (9): 7009-7024 (2022)