Author of the publication

Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization.

, , , and . NEW2AN, volume 9870 of Lecture Notes in Computer Science, page 217-229. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Switchable Controlled Operations with Bent Functions., , , and . MECO, page 1-5. IEEE, (2020)Creation of codes based on wavelet transformation and its application in ADV612 chips., and . Int. J. Wavelets Multiresolution Inf. Process., 15 (2): 1750014:1-1750014:16 (2017)High Performance Parallel Pseudorandom Number Generator on Cellular Automata., , , , , and . Symmetry, 14 (9): 1869 (2022)New construction of algebraic manipulation detection codes based on wavelet transform., and . FRUCT, page 187-192. IEEE, (2016)Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges., , , , , and . IEEE Access, (2017)Algorithm for simplifying the SHA-256 operations tree., and . CSR, page 592-597. IEEE, (2023)Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module., and . NTMS, page 1-5. IEEE, (2021)Protection Metric Model of White-Box Algorithms., and . MECO, page 1-3. IEEE, (2022)Similar Product Clustering for Long-Tail Cross-Sell Recommendations., and . AIST (Supplement), volume 1975 of CEUR Workshop Proceedings, page 273-280. CEUR-WS.org, (2017)Physical model of sensitive data leakage from PC-based cryptographic systems., , , and . J. Cryptographic Engineering, 9 (4): 393-400 (2019)