From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Security and Stability of AODV with Fuzzy Neural Network in VANET., , и . WASA, том 10874 из Lecture Notes in Computer Science, стр. 177-188. Springer, (2018)Conjugate gradient-type method for the tensor linear system via the T-product and its application in the calculation of Moore-Penrose inverse.. Appl. Math. Comput., (2024)A Range Search Scheme Based on Encrypted Index Hiding Order and Access Patterns., и . iThings/GreenCom/CPSCom/SmartData, стр. 340-347. IEEE, (2019)Dynamic Role and Context-Based Access Control for Grid Applications., , , и . PDCAT, стр. 404-406. IEEE Computer Society, (2005)One transmission scheme based on variable MSK modulator for wireless physical layer security., , , и . WCSP, стр. 1-5. IEEE, (2015)An iterative algorithm for the least Frobenius norm least squares solution of a class of generalized coupled Sylvester-transpose linear matrix equations., и . Appl. Math. Comput., (2018)Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing., и . WASA, том 10251 из Lecture Notes in Computer Science, стр. 653-664. Springer, (2017)Enhancing Negative Messages Broadcasting with Meet-Table and TTL in VANET., , и . IIKI, том 129 из Procedia Computer Science, стр. 185-187. Elsevier, (2017)A Homomorphic Searching Scheme For Sensitive Data In NoSQL Database., , , и . iThings/GreenCom/CPSCom/SmartData, стр. 575-579. IEEE, (2018)A verifiable ranked ciphertext retrieval scheme based on bilinear mapping., , , и . Concurr. Comput. Pract. Exp., (2022)