From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research of Tool State Recognition Based on CEEMD-WPT., , , и . ICCCS (2), том 11064 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2018)Composite Structure Health Monitoring Review Based on FBG Sensor., , и . ICCCS (5), том 11067 из Lecture Notes in Computer Science, стр. 171-179. Springer, (2018)New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks., , , и . Pairing, том 6487 из Lecture Notes in Computer Science, стр. 327-346. Springer, (2010)Real-time Obstacle Avoidance Strategy for Mobile Robot Based On Improved Coordinating Potential Field with Genetic Algorithm., , и . CCA, стр. 415-419. IEEE, (2007)Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation., , , , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 493-502. Springer, (2009)AODV协议在渔船超短波自组网中的仿真与分析 (Simulation and Analysis of AODV Protocol in Fishing Marine VHF Ad Hoc Network)., , , и . 计算机科学, 43 (Z6): 285-287 (2016)Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 70-88 (2012)Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol., , , и . IEEE Commun. Lett., 12 (2): 149-151 (2008)Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys., , , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 198-203. Springer, (2005)Design and Implementation of Bus Net Routing Algorithm., , , , и . CIS, стр. 1474-1478. IEEE Computer Society, (2011)