From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper., , , , , и . IEEE Access, (2019)A New Post-Quantum Blind Signature From Lattice Assumptions., , , , и . IEEE Access, (2018)Towards load balancing in IoV system: A vehicle-assisted batch verification scheme., , , , и . Veh. Commun., (декабря 2023)Time-optimal tool motion planning with tool-tip kinematic constraints for robotic machining of sculptured surfaces., , , , и . Robotics Comput. Integr. Manuf., (2020)An optimisation for a two-round good-case latency protocol., , , , , и . IET Inf. Secur., 17 (4): 664-680 (июля 2023)A comparison of clustering algorithms applied to fluid characterization using NMR T1-T2 maps of shale., , , , , и . Comput. Geosci., (2019)A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort., , , , и . Comput. J., 65 (9): 2400-2410 (2022)Keyword guessing on multi-user searchable encryption., , , и . Int. J. High Perform. Comput. Netw., 14 (1): 60-68 (2019)Office message center - a spoken dialogue system., , , , , , и . INTERSPEECH, стр. 704-706. ISCA, (2000)A dynamic cross-reference pruning strategy for multiple feature fusion at decoder run time., , , , , и . INTERSPEECH, стр. 1177-1180. ISCA, (2003)