From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A secure scheme to share secret color images., , , и . Comput. Phys. Commun., 173 (1-2): 9-16 (2005)A multisecret sharing scheme for color images based on cellular automata., , и . Inf. Sci., 178 (22): 4382-4395 (2008)PUMA: Permission Usage to Detect Malware in Android., , , , , и . CISIS/ICEUTE/SOCO Special Sessions, том 189 из Advances in Intelligent Systems and Computing, стр. 289-298. Springer, (2012)Estimation of the control parameter from symbolic sequences: Unimodal maps with variable critical point, , и . (2009)Emparejamiento de patrones en medallones de espiral múltiple, , , , , и . (2008)On the inadequacy of the logistic map for cryptographic applications, , и . (2008)Contribución al estudio de la estructura interna del conjunto de Mandelbrot y aplicaciones en criptografía.. Technical University of Madrid, Spain, (2000)A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks., , , и . CISIS, том 85 из Advances in Intelligent and Soft Computing, стр. 135-142. Springer, (2010)Trident, a new pseudo random number generator based on coupled chaotic maps, , , , , и . CoRR, (2010)CAPTCHAs: An Artificial Intelligence Application to Web Security., и . Adv. Comput., (2011)