From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Nth Order Binary Encoding with Split-Protocol., , , , и . Int. J. Rough Sets Data Anal., 5 (2): 95-118 (2018)Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud., , , и . J. Inf. Sci. Eng., 33 (3): 695-712 (2017)An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks., , , , и . IEEE Trans. Intell. Transp. Syst., 24 (12): 15590-15600 (декабря 2023)Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication., , , и . KSII Trans. Internet Inf. Syst., 7 (4): 878-894 (2013)Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments., , , , , и . IEEE Internet Things J., 5 (4): 2904-2914 (2018)Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things., , , и . IEEE Trans. Ind. Informatics, 18 (8): 5422-5431 (2022)A provably secure password-based anonymous authentication scheme for wireless body area networks., , , , и . Comput. Electr. Eng., (2018)A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication., , , , и . Multim. Tools Appl., 77 (9): 11041-11066 (2018)An efficient combined deep neural network based malware detection framework in 5G environment., , , , , и . Comput. Networks, (2021)Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities., , , , , и . Trans. Emerg. Telecommun. Technol., (2021)