From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Dark Target Algorithm for Observing the Global Aerosol System: Past, Present, and Future., , , , , , , , , и 6 other автор(ы). Remote. Sens., 12 (18): 2900 (2020)Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment., , и . ITCS, том 180 из Lecture Notes in Electrical Engineering, стр. 233-240. Springer, (2012)Monitoring Atmospheric Composition by Geo-Kompsat-2: Goci-2, Ami and Gems., , , , , , , , , и 3 other автор(ы). IGARSS, стр. 7750-7752. IEEE, (2018)Aerosol Property Retrieval Algorithm over Northeast Asia from TANSO-CAI Measurements Onboard GOSAT., , , , , , , , , и 2 other автор(ы). Remote. Sens., 9 (7): 687 (2017)The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System., и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 781-787. Springer, (2013)Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing., , и . GPC, том 7861 из Lecture Notes in Computer Science, стр. 761-766. Springer, (2013)IPTV game test-bed system based on Bluetooth network., и . ICCE-Berlin, стр. 227-230. IEEE, (2016)The difference of player's action code by playing experience in combat oriented situation of FPS game., и . GCCE, стр. 336-338. IEEE, (2015)Collaborative Pattern Design Project System Based on CSCW., , и . International Conference on Internet Computing, стр. 161-164. CSREA Press, (2008)An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols., , и . WISM (1), том 6987 из Lecture Notes in Computer Science, стр. 259-270. Springer, (2011)