Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability issues for a multi-version post-severe NPP accident monitoring system., , , , and . IDAACS, page 942-946. IEEE, (2017)Novel Innovations that Failed to Improve Weak PRNGs., , and . ICCCNT, page 1-6. IEEE, (2022)An Introduction to Local Entropy and Local Unicity., , , , and . ISNCC, page 1-7. IEEE, (2022)Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications., , , , and . ISNCC, page 1-6. IEEE, (2022)A wireless navigation system with no external positions., , , and . IDAACS, page 898-901. IEEE, (2015)A secure architecture for IoT with supply chain risk management., , and . IDAACS, page 431-435. IEEE, (2017)On the use of diagnostic dependence-analysis tools in parallel programming: Experiences using PTOOL., , , and . J. Supercomput., 4 (1): 83-96 (1990)Analysis of a Cryptographically Secure Pseudo Random Number Generator., , and . IDAACS, page 259-264. IEEE, (2023)A big data file transfer tool for tablet-class machines., , and . IDAACS, page 676-680. IEEE, (2013)The Dataflow Time and Space Complexity of FFTs., and . J. Parallel Distributed Comput., 18 (3): 301-313 (1993)