From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of different architectures of neural networks for application in Intrusion Detection Systems., и . IMCSIT, стр. 807-811. IEEE, (2008)On a mechanism of detection of coalitions for reputation systems in P2P networks., и . SPECTS, стр. 578-584. IEEE, (2014)Secure time information in the internet key exchange protocol., и . Ann. UMCS Informatica, 11 (3): 41-56 (2011)Addressing New Challenges by Building Security Protocols Around Graphs., и . Security Protocols Workshop, том 3364 из Lecture Notes in Computer Science, стр. 301-306. Springer, (2003)On Application of Neural Networks for S-Boxes Design., и . AWIC, том 3528 из Lecture Notes in Computer Science, стр. 243-248. Springer, (2005)Mobile Agents: Preserving Privacy and Anonymity., и . IMTCI, том 3490 из Lecture Notes in Computer Science, стр. 246-258. Springer, (2004)Neural Network as a Programmable Block Cipher., и . Advances in Information Processing and Protection, Springer, (2007)On alternative approach for verifiable secret sharing, , и . CoRR, (2002)Alternative security architecture for IP Telephony based on digital watermarking, и . CoRR, (2005)Integrity of mobile agents: a new approach., и . Int. J. Netw. Secur., 4 (2): 201-211 (2007)