Author of the publication

Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques.

, , and . PECCS, page 91-98. ScitePress, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Downlink Multiuser MIMO-OFDM Systems., , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 449-463. Springer, (2011)Smart Collection of Real-Time Vehicular Mobility Traces., , , , and . Future Internet, 10 (8): 78 (2018)Modulation-Mode Assignment for SVD-Assisted and Iteratively Detected Downlink Multiuser MIMO Transmission Schemes., and . WINSYS, page 107-114. SciTePress, (2010)Modulation-mode and power assignment for broadband MIMO-BICM schemes., and . PIMRC, page 236-240. IEEE, (2009)Cyber Risk Assessment for Insurability Verification., , and . PECCS, page 231-235. SciTePress, (2018)Analysis of finite word length effects and frequency response in interpolators for digital up-converters., , and . Communication Systems and Networks, page 91-96. IASTED/ACTA Press, (2006)Efficient mobility modeling of autonomous movement planning trajectories using AI algorithms., , , and . ISIVC, page 1-6. IEEE, (2022)Modulation-Mode Assignment for SVD-Aided and BICM-Assisted Downlink Multiuser MIMO Transmission Schemes., and . ICETE (Selected Papers), volume 222 of Communications in Computer and Information Science, page 395-409. Springer, (2010)Risk Assessment and Verification of Insurability., , and . PECCS, page 105-108. SciTePress, (2017)Traffic Estimation for Dynamic Capacity Adaptation in Load Adaptive Network Operation Regimes., , and . PECCS, page 99-104. SciTePress, (2016)