From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating Effective Use of Social Networks for Recruitment., и . CPR, стр. 125-133. ACM, (2016)Security for the Mythical Air-Dropped Sensor Network., , , и . ISCC, стр. 41-47. IEEE Computer Society, (2006)Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniques., , , и . ICOIN, стр. 305-310. IEEE, (2021)Dynamic Obstacle Detection and Environmental Modelling for Agricultural Drones., , и . ACIRS, стр. 70-75. IEEE, (2022)High Performance Agile Crypto Modules., , и . ACISP, том 1841 из Lecture Notes in Computer Science, стр. 74-88. Springer, (2000)Why Hierarchical Key Distribution Is Appropriate for Multicast Networks., , и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 120-131. Springer, (1999)Virtual Product Try-On Solution for E-Commerce Using Mobile Augmented Reality., , , , и . AVR (1), том 10324 из Lecture Notes in Computer Science, стр. 438-447. Springer, (2017)A Social Wallet Scheme with Robust Private Key Recovery., , , и . ICIIS, стр. 1-6. IEEE, (2023)Organizational Modeling for Efficient Specification of Information Security Requirements., , и . ADBIS, том 1691 из Lecture Notes in Computer Science, стр. 247-260. Springer, (1999)Encrypted Message Authentication by Firewalls., , и . Public Key Cryptography, том 1560 из Lecture Notes in Computer Science, стр. 69-81. Springer, (1999)