From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning-Based Drug Repositioning of Novel Janus Kinase 2 Inhibitors Utilizing Molecular Docking and Molecular Dynamic Simulation., , , , , , , и . J. Chem. Inf. Model., 63 (21): 6487-6500 (ноября 2023)Design of an efficient image protection method based on QR code., , и . ICTC, стр. 1448-1450. IEEE, (2020)A lightweight authentication mechanism between IoT devices., и . ICTC, стр. 1153-1155. IEEE, (2017)Implementation of a TCG-Based Trusted Computing in Mobile Device., , , , и . TrustBus, том 5185 из Lecture Notes in Computer Science, стр. 18-27. Springer, (2008)A Secret Key Updating Method between Devices for Secure Smart Services., и . ICTC, стр. 946-948. IEEE, (2018)Global Navigation Satellite System Signal Generation Method for Wide Area Protection Against Numerous Unintentional Drones., , , , и . IEEE Access, (2021)De-identification and restoration methods for protecting privacy in off-line documents., , и . ICTC, стр. 1543-1545. IEEE, (2020)Security considerations for secure and trustworthy smart home system in the IoT environment., , и . ICTC, стр. 1116-1118. IEEE, (2015)Improvement on TCG Attestation and Its Implication for DRM., , и . ICCSA (1), том 4705 из Lecture Notes in Computer Science, стр. 912-925. Springer, (2007)Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card., , , , и . ICDCS Workshops, стр. 272-278. IEEE Computer Society, (2002)