From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Structured Encryption for Conceptual Graphs., , и . IWSEC, том 7631 из Lecture Notes in Computer Science, стр. 105-122. Springer, (2012)LTE efficiency when used in traffic information systems: A stable interest aware clustering., , и . Int. J. Commun. Syst., (2019)Spectrum sensing challenges & their solutions in cognitive radio based vehicular networks., , , , , , и . Int. J. Commun. Syst., (2021)AES: Current security and efficiency analysis of its alternatives., , , и . IAS, стр. 267-274. IEEE, (2011)Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection., , , , , , и . IEEE Access, (2023)Wireless backhaul network's capacity optimization using time series forecasting approach., , , , , , , и . J. Ambient Intell. Humaniz. Comput., 12 (1): 1407-1418 (2021)Algebraic Analysis of LEX., , , , , и . AISC, том 98 из CRPIT, стр. 33-45. Australian Computer Society, (2009)Linearity within the SMS4 Block Cipher., , , и . Inscrypt, том 6151 из Lecture Notes in Computer Science, стр. 248-265. Springer, (2009)Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks., , , , и . J. Supercomput., 76 (8): 5948-5970 (2020)Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance., , и . New Gener. Comput., 34 (3): 221-238 (2016)