From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis on RFID Mutual Authentication Protocol., , , и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 65-74. Springer, (2015)Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism., , , , и . ICOIN, том 3090 из Lecture Notes in Computer Science, стр. 915-924. Springer, (2004)A new fault cryptanalysis on montgomery ladder exponentiation algorithm., , , , , и . ICIS, том 403 из ACM International Conference Proceeding Series, стр. 896-899. ACM, (2009)Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver., , , и . ICTC, стр. 833-835. IEEE, (2018)A Security Framework for a Drone Delivery Service., , , , и . DroNet@MobiSys, стр. 29-34. ACM, (2016)