From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks., и . Wirel. Networks, 26 (6): 4615-4635 (2020)Physical Simulation of Ultrasonic Imaging Logging Response., , , , , , и . Sensors, 22 (23): 9422 (2022)Utilization-Aware Hybrid Beacon Scheduling in Cluster-Tree ZigBee Networks., , , и . IEICE Trans. Inf. Syst., 98-D (9): 1657-1666 (2015)Chaining the secret: Lightweight authentication for security in pervasive computing.. PerCom Workshops, стр. 1-3. IEEE Computer Society, (2016)GS1 Connected Car Using EPCIS-ONS System., , , , , и . BigData Congress, стр. 426-429. IEEE Computer Society, (2016)Practical In-Vehicle Security Architecture based on Trust Anchors., и . VTC2023-Spring, стр. 1-3. IEEE, (2023)Practical security analysis for the constrained node networks: Focusing on the DTLS protocol., , и . IOT, стр. 22-29. IEEE, (2015)Oliot-OpenCity: Open Standard Interoperable Smart City Platform., , , , , , , , , и . ISC2, стр. 1-8. IEEE, (2018)GS1 Connected Car: An Integrated Vehicle Information Platform and Its Ecosystem for Connected Car Services based on GS1 Standards., , , , , , , , , и . Intelligent Vehicles Symposium, стр. 367-374. IEEE, (2018)Hybrid neural coded modulation: Design and training methods., , , , и . ICT Express, 8 (1): 25-30 (2022)