From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Breaking H2-MAC Using Birthday Paradox., , и . IACR Cryptology ePrint Archive, (2011)Establish a scientific concept of network security and build a strong defense line of network security., , , и . CyberC, стр. xxix-xxxi. IEEE, (2020)Trust Extended Dynamic Security Model and Its Application in Network., , , , и . MSN, том 4325 из Lecture Notes in Computer Science, стр. 404-415. Springer, (2006)New Algorithms for Counting Temporal Graph Pattern., , , , и . Symmetry, 11 (10): 1188 (2019)Design of secure operating systems with high security levels., и . Sci. China Ser. F Inf. Sci., 50 (3): 399-418 (2007)The Banknote Anti-forgery System Based on Digital Signature Algorithms., , и . ISI Workshops, том 5075 из Lecture Notes in Computer Science, стр. 44-49. Springer, (2008)Video Subtitle Location and Recognition Based on Edge Features., , , и . DSA, стр. 455-459. IEEE, (2019)TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things., , , , , , , и . IEEE Access, (2019)Barrier Coverage with Mobile Sensors., , , и . ISPAN, стр. 99-104. IEEE Computer Society, (2008)Research on trusted computing and its development., , , , , , , , и . Sci. China Inf. Sci., 53 (3): 405-433 (2010)