From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Teaching RFID Information Systems Security., , и . IEEE Trans. Educ., 57 (1): 42-47 (2014)Fingerprinting RFID Tags., , и . IEEE Trans. Dependable Secur. Comput., 8 (6): 938-943 (2011)Identity Management., и . IEEE Internet Comput., 11 (3): 82-85 (2007)Feature selection for RFID tag identification., , , и . CHINACOM, стр. 218-221. IEEE, (2012)Using dummy data for RFID tag and reader authentication., , , и . Digit. Commun. Networks, 8 (5): 804-813 (2022)Load Balancing on a Grid Using Data Characteristics., и . GCA, стр. 184-190. CSREA Press, (2005)Sample-sort simulated annealing., и . IEEE Trans. Syst. Man Cybern. Part B, 35 (3): 625-632 (2005)Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network., и . IEEE Communications Letters, 4 (8): 267-269 (2000)Analysis of Decoy Strategies for Detecting Ransomware., и . CNS, стр. 1-6. IEEE, (2023)Exploiting hidden Markov models in identifying passive UHF RFID tags., , и . RWS, стр. 259-261. IEEE, (2014)