From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks., и . Sensors, 15 (9): 23145-23167 (2015)Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs)., , и . Sensors, 18 (12): 4258 (2018)Backward connection preemption in multiclass QoS-aware networks., и . IWQoS, стр. 153-160. IEEE, (2004)Lightweight protocol for anonymity and mutual authentication in RFID systems., , и . CCNC, стр. 910-915. IEEE, (2015)Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures., и . IEEE Trans. Computers, 41 (11): 1465-1478 (1992)Test Suite for Vulnerability Analysis of RFID Systems., , , , , , , и . ICWN, стр. 70-75. CSREA Press, (2010)A mobile role-based access control system using identity-based encryption with zero knowledge proof., , и . CISDA, стр. 1-7. IEEE, (2012)Further Improvements of Fast Encryption Algoirthm for Multimedia., и . Int. J. Netw. Secur., 7 (2): 187-192 (2008)Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm., , , и . IEEE Trans. Netw. Sci. Eng., 8 (3): 2559-2574 (2021)A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks., , , и . Symmetry, 14 (8): 1625 (2022)