From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Light weight and fine-grained access mechanism for secure access to outsourced data., , , , , и . Concurr. Comput. Pract. Exp., (2019)A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases., , , , , , , и . CoRR, (2020)Robust extended Kalman filter based technique for location management in PCS networks., , и . Comput. Commun., 27 (5): 502-512 (2004)Deploying long-lived and cost-effective hybrid sensor networks., , , и . Ad Hoc Networks, 4 (6): 749-767 (2006)Design, Analysis and Implementation of a Novel Multiple Resource Scheduler., , и . IEEE Trans. Computers, 56 (8): 1071-1086 (2007)De-Anonymisation Attacks on Tor: A Survey., , , , и . IEEE Commun. Surv. Tutorials, 23 (4): 2324-2350 (2021)B-FERL: Blockchain based Framework for Securing Smart Vehicles., , , , и . CoRR, (2020)Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints., , , , и . IEEE Trans. Inf. Forensics Secur., 9 (12): 2193-2204 (2014)Current directions in active programmable network., , и . ICON, стр. 240-245. IEEE, (2001)Risk Analysis Study of Fully Autonomous Vehicle., , и . CoRR, (2019)