From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using shortest path to discover criminal community., , и . Digital Investigation, (2015)Fourier Transforms from a Weighted Trace Map., и . ISIT, стр. 1080-1084. IEEE, (2006)A Path to Hadamard Matrices., и . AAECC, том 4851 из Lecture Notes in Computer Science, стр. 281-290. Springer, (2007)Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey., , и . IEEE Internet Things J., 8 (6): 4132-4156 (2021)The Invisible COVID-19 Small Business Risks: Dealing with the Cyber-Security Aftermath., , и . Digit. Gov. Res. Pract., 2 (2): 23:1-23:8 (2021)Non-Technical skills needed by cyber security graduates., и . EDUCON, стр. 354-358. IEEE, (2020)An Image-Guided Heuristic for Planning an Exhaustive Enumeration., и . HIS, стр. 136-141. IEEE Computer Society, (2004)Planar difference functions., , и . ISIT, стр. 1082-1086. IEEE, (2012)A family of two-weight irreducible cyclic codes., и . IEEE Trans. Inf. Theory, 56 (6): 2568-2570 (2010)Kathy Horadam: sixty.. Australas. J Comb., (2013)