From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography., , , и . CCIS, стр. 487-490. IEEE, (2014)Community-Aware Opportunistic Routing in Mobile Social Networks., , и . IEEE Trans. Computers, 63 (7): 1682-1695 (2014)Practical indoor tracking using Wireless Sensor Networks., , , , и . WPNC, стр. 209-215. IEEE, (2009)Coverage and Exposure Paths in Wireless Sensor Networks., , , , и . J. Comput. Sci. Technol., 21 (4): 490-495 (2006)A Threshold Multi-secret Sharing Scheme., , , и . ICNSC, стр. 1705-1707. IEEE, (2008)Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones., , , и . Sensors, 16 (8): 1314 (2016)Exploiting Cantor Expansion for Covert Channels over LTE-Advanced., , , и . ICONIP (5), том 10638 из Lecture Notes in Computer Science, стр. 878-887. Springer, (2017)Common Vulnerability Markup Language., , , и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 228-240. Springer, (2003)On the effect of flow table size and controller capacity on SDN network throughput., , , , и . ICC, стр. 1-6. IEEE, (2017)Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks., , , , и . SECON, стр. 301-309. IEEE, (2015)