From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unveiling Threats: Leveraging User Behavior Analysis for Enhanced Cybersecurity., , , и . ECAI, стр. 1-6. IEEE, (2023)On recommendation systems applied in big data.. ECAI, стр. 1-6. IEEE, (2016)Fuel Monitoring System based on IoT: Overview and Device Authentication., и . COMM, стр. 1-4. IEEE, (2022)Security and Cryptographic Challenges for Authentication Based on Biometrics Data., , и . Cryptogr., 2 (4): 39 (2018)A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments., и . Cryptogr., 6 (1): 8 (2022)Blockchain Applications in Computer Communication., и . ECAI, стр. 1-4. IEEE, (2021)Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective., и . IntelliSys (2), том 543 из Lecture Notes in Networks and Systems, стр. 26-48. Springer, (2022)Blockchain Search Using Searchable Encryption Based on Elliptic Curves., и . AINA (3), том 451 из Lecture Notes in Networks and Systems, стр. 471-481. Springer, (2022)Elliptic Curve-Based Query Authentication Protocol for IoT Devices Aided by Blockchain., и . Sensors, 23 (3): 1371 (февраля 2023)Authentication Protocol for Intelligent Cars using Fog Computing and Software-Defined Networking., , и . ECAI, стр. 1-6. IEEE, (2021)