From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Calantha: Content distribution across geo-distributed datacenters., , , , и . INFOCOM Workshops, стр. 724-729. IEEE, (2017)Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme., , , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 839-846. Springer, (2016)Performance evaluation of reliable and unreliable opportunistic flooding in wireless sensor network., , и . ICON, стр. 7-12. IEEE, (2011)A novel simulator for RFID reader-to-reader anti-collision protocols., , , , и . EURFID, стр. 59-64. IEEE, (2015)Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation., , , и . BWCCA, том 12 из Lecture Notes on Data Engineering and Communications Technologies, стр. 811-820. Springer, (2017)Fast MmWave Beam Alignment Method with Adaptive Discounted Thompson Sampling., , , и . WCNC, стр. 1-6. IEEE, (2024)A Comparison between Single and Additive Contribution in RFID Reader-to-Reader Interference Models., , , и . IMIS, стр. 177-184. IEEE Computer Society, (2012)Simulating Reader-to-Reader Interference in RFID Systems., , , , и . AINA Workshops, стр. 1063-1069. IEEE Computer Society, (2013)Investigation of Interference Models for RFID Systems., , , и . Sensors, 16 (2): 199 (2016)Secure deduplication of encrypted data in online and offline environments., , , и . Int. J. High Perform. Comput. Netw., 14 (3): 294-303 (2019)