From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Control Memory Wort Width Optimization Using Multiple-Valued Circuits., , и . IEEE Trans. Computers, 30 (2): 148-153 (1981)Ziffersystem: A novel malware distribution detection system., , , , и . DSC, стр. 509-515. IEEE, (2017)A novel approach for re-authentication protocol using personalized information., , , , и . ICMLC, стр. 1826-1829. IEEE, (2012)A Study on Online Game Cheating and the Effective Defense., и . IEA/AIE, том 7906 из Lecture Notes in Computer Science, стр. 518-527. Springer, (2013)Network security: Protocol reference model and the trusted computer system evaluation criteria., и . IEEE Netw., 1 (2): 24-33 (1987)GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack., , и . IPCCC, стр. 392-399. IEEE Computer Society, (2012)One private-key for all DL-based cryptosystems., , и . Appl. Math. Comput., 170 (1): 666-672 (2005)Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction., , , , , и . TrustCom/BigDataSE/ISPA (1), стр. 334-343. IEEE, (2015)Android privacy., , , , и . ICMLC, стр. 1830-1837. IEEE, (2012)Larbac: enforcement of location constraints for location-aware RBAC system in mobile environment., , и . ICMLC, стр. 1195-1200. IEEE, (2013)