From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure cloud storage with anonymous deduplication using ID-based key management., и . J. Supercomput., 79 (2): 2356-2382 (2023)Fully Distributed Self Certified Key Management for Large-Scale MANETs., , , и . UIC/ATC, стр. 96-102. IEEE Computer Society, (2013)Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach., , и . IEEE Trans. Mob. Comput., 15 (9): 2333-2344 (2016)KPsec: Secure End-to-End Communications for Multi-Hop Wireless Networks., , и . CoRR, (2019)How UAVs' Highly Dynamic 3D Movement Improves Network Security?, и . CoRR, (2021)A novel human mobility model for MANETs based on real data., , , и . ICCCN, стр. 1-7. IEEE, (2014)Secure Overlay Routing for Large Scale Networks., , и . IEEE Trans. Netw. Sci. Eng., 6 (3): 501-511 (2019)UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems., , , и . IEEE Access, (2020)Fully distributed ECC-based key management for mobile ad hoc networks., , , и . Comput. Networks, (2017)Decentralized Social Networking Using Named-Data., , и . CN, том 522 из Communications in Computer and Information Science, стр. 421-430. Springer, (2015)