From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multiple Access Wire-tap Channel with Common Message., , , и . CoRR, (2014)An Optimal Transmission Policy for Energy Harvesting Systems with Continuous Energy and Data Arrivals., , , и . CoRR, (2015)On the Equivalency of Reliability and Security Metrics for Wireline Networks., , и . CoRR, (2016)Interference Alignment for the K-user Interference Channel with Imperfect CSI., и . CoRR, (2015)Statistical Performance Analysis of MDL Source Enumeration in Array Processing, , , и . CoRR, (2009)Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction., , и . IACR Cryptology ePrint Archive, (2016)JHAE: An Authenticated Encryption Mode Based on JH., , и . IACR Cryptology ePrint Archive, (2014)Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message., , , и . IEEE Trans. Inf. Forensics Secur., 11 (6): 1239-1251 (2016)A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach., , , и . IEEE Trans. Signal Process., 55 (5-1): 1815-1827 (2007)Impossible differential attack on seven-round AES-128., и . IET Inf. Secur., 2 (2): 28-32 (2008)