From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks., и . Wireless Personal Communications, 94 (3): 467-479 (2017)Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions., , , и . IEEE Consumer Electronics Magazine, 8 (3): 10-16 (2019)Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks.. J. Inf. Secur. Appl., (2017)Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot., , , и . Comput. Networks, (2021)Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap., , , , и . IEEE Access, (2021)Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices., и . IEEE Internet Things J., 6 (1): 580-589 (2019)E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System., , , и . CoRR, (2022)An Effective LSTM-DDPM Scheme for Energy Theft Detection and Forecasting in Smart Grid., , , , и . CoRR, (2023)IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes., и . Secur. Commun. Networks, 8 (18): 3939-3952 (2015)The Language's Impact on the Enigma Machine., и . IACR Cryptol. ePrint Arch., (2021)